20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 207.970589][T11473] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 208.001375][T11467] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 208.010631][T11473] EXT4-fs (loop2): get root inode failed [ 208.022838][T11471] EXT4-fs error (device loop4): ext4_ext_check_inode:498: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 208.027772][T11467] EXT4-fs (loop0): mount failed [ 208.044319][T11473] EXT4-fs (loop2): mount failed [ 208.054668][T11475] EXT4-fs error (device loop5): ext4_fill_super:4587: inode #2: comm syz-executor.5: iget: root inode unallocated [ 208.067535][T11471] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 208.069483][T11475] EXT4-fs (loop5): get root inode failed [ 208.079139][T11471] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 208.083805][T11475] EXT4-fs (loop5): mount failed [ 208.099118][T11471] EXT4-fs (loop4): mount failed 02:10:13 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) [ 208.321102][T11499] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 208.333460][T11499] EXT4-fs (loop2): get root inode failed [ 208.339236][T11499] EXT4-fs (loop2): mount failed [ 208.402411][T11510] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 208.402426][T11508] EXT4-fs error (device loop4): ext4_ext_check_inode:498: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 208.411447][T11508] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 02:10:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 208.425328][T11510] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 208.440018][T11508] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 208.449436][T11510] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 208.460788][T11508] EXT4-fs (loop4): mount failed [ 208.488273][T11510] EXT4-fs (loop0): mount failed 02:10:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) [ 208.653273][T11534] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 208.673040][T11534] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 208.689225][T11534] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 208.691128][T11536] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 208.704216][T11534] EXT4-fs (loop0): mount failed [ 208.718102][T11536] EXT4-fs (loop2): get root inode failed [ 208.726419][T11536] EXT4-fs (loop2): mount failed 02:10:13 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 208.757742][T11531] EXT4-fs error (device loop4): ext4_ext_check_inode:498: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 208.777018][T11531] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 208.787739][T11531] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 208.802444][T11531] EXT4-fs (loop4): mount failed 02:10:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:13 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:14 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) 02:10:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 209.037977][T11557] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 209.052484][T11557] EXT4-fs (loop2): get root inode failed [ 209.059690][T11557] EXT4-fs (loop2): mount failed [ 209.069144][T11570] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:10:14 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:14 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 209.100669][T11570] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 209.112352][T11570] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 209.127557][T11570] EXT4-fs (loop0): mount failed 02:10:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:14 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) [ 209.320893][T11577] EXT4-fs error (device loop4): ext4_ext_check_inode:498: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 209.340420][T11577] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 209.351872][T11577] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 209.366444][T11577] EXT4-fs (loop4): mount failed [ 209.386667][T11585] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 209.400371][T11585] EXT4-fs (loop2): get root inode failed [ 209.400852][T11586] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 209.406352][T11585] EXT4-fs (loop2): mount failed 02:10:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:14 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 209.430331][T11586] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 209.454818][T11586] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 209.469085][T11586] EXT4-fs (loop0): mount failed 02:10:14 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) 02:10:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) 02:10:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:14 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 209.734726][T11613] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 209.751087][T11610] EXT4-fs error (device loop4): ext4_ext_check_inode:498: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 209.779320][T11610] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 209.780086][T11613] EXT4-fs (loop2): get root inode failed [ 209.791708][T11610] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 209.798046][T11613] EXT4-fs (loop2): mount failed [ 209.820252][T11610] EXT4-fs (loop4): mount failed 02:10:14 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 209.852430][T11624] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 209.873272][T11624] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 209.884779][T11624] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:10:14 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:14 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) [ 209.899215][T11624] EXT4-fs (loop0): mount failed 02:10:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.086287][T11637] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 210.101638][T11646] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 210.122196][T11637] EXT4-fs (loop2): get root inode failed 02:10:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.122732][T11646] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 210.128443][T11637] EXT4-fs (loop2): mount failed [ 210.140419][T11646] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 210.162809][T11646] EXT4-fs (loop0): mount failed 02:10:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.238749][T11652] EXT4-fs error (device loop4): ext4_ext_check_inode:498: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 210.258223][T11652] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 210.269741][T11652] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 210.284293][T11652] EXT4-fs (loop4): mount failed 02:10:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) dup3(r2, r0, 0x0) 02:10:15 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.425670][T11666] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 210.449195][T11666] EXT4-fs (loop2): get root inode failed [ 210.458847][T11666] EXT4-fs (loop2): mount failed 02:10:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.489797][T11682] EXT4-fs error (device loop4): ext4_ext_check_inode:498: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 210.511190][T11682] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 210.513874][T11684] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 210.523744][T11682] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 210.541187][T11684] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 210.568763][T11682] EXT4-fs (loop4): mount failed [ 210.576345][T11684] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 210.590731][T11684] EXT4-fs (loop0): mount failed 02:10:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.735599][T11693] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 210.747872][T11693] EXT4-fs (loop2): get root inode failed [ 210.753759][T11693] EXT4-fs (loop2): mount failed 02:10:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.822022][T11710] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 210.840601][T11710] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 210.852273][T11710] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:10:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.871246][T11710] EXT4-fs (loop0): mount failed 02:10:15 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 210.910917][T11711] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 210.921879][T11711] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 210.936589][T11711] EXT4-fs (loop4): mount failed 02:10:16 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r0, 0xffffffffffffffff, 0x0) 02:10:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 211.023582][T11717] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 211.043592][T11717] EXT4-fs (loop2): get root inode failed 02:10:16 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r0, 0xffffffffffffffff, 0x0) 02:10:16 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r0, 0xffffffffffffffff, 0x0) [ 211.075288][T11717] EXT4-fs (loop2): mount failed [ 211.143571][T11737] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 211.162250][T11737] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 211.173638][T11737] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:10:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 211.201662][T11737] EXT4-fs (loop0): mount failed [ 211.211511][T11736] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 211.234075][T11736] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:10:16 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 211.265509][T11736] EXT4-fs (loop4): mount failed 02:10:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 211.363034][T11757] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 211.375448][T11757] EXT4-fs (loop2): get root inode failed [ 211.381434][T11757] EXT4-fs (loop2): mount failed [ 211.419131][T11761] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 211.437760][T11761] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 211.449238][T11761] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 211.464560][T11761] EXT4-fs (loop0): mount failed 02:10:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 211.687274][T11783] EXT4-fs error (device loop4): ext4_quota_enable:6002: comm syz-executor.4: Bad quota inode # 3 [ 211.706091][T11783] EXT4-fs warning (device loop4): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 211.721407][T11783] EXT4-fs (loop4): mount failed 02:10:16 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 211.792613][T11787] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 211.800900][T11791] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 211.805869][T11787] EXT4-fs (loop2): get root inode failed [ 211.823090][T11791] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 02:10:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 211.828606][T11787] EXT4-fs (loop2): mount failed [ 211.845623][T11791] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 211.860227][T11791] EXT4-fs (loop0): mount failed 02:10:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 212.068989][T11809] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 212.076842][T11813] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 212.078431][T11809] EXT4-fs (loop2): mount failed [ 212.095204][T11813] EXT4-fs (loop4): get root inode failed [ 212.102199][T11813] EXT4-fs (loop4): mount failed 02:10:17 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 212.275619][T11823] EXT4-fs error (device loop0): ext4_ext_check_inode:498: inode #3: comm syz-executor.0: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 212.312847][T11823] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 212.324384][T11823] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 212.338668][T11823] EXT4-fs (loop0): mount failed 02:10:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 212.439355][T11839] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 212.454200][T11839] EXT4-fs (loop4): get root inode failed [ 212.463969][T11839] EXT4-fs (loop4): mount failed [ 212.465419][T11843] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 212.475710][T11843] EXT4-fs (loop2): mount failed 02:10:17 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x0) dup3(r1, r0, 0x0) 02:10:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 212.701470][T11860] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 212.701795][T11861] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 212.721406][T11860] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 212.732148][T11861] EXT4-fs (loop4): get root inode failed [ 212.745054][T11861] EXT4-fs (loop4): mount failed [ 212.746699][T11860] EXT4-fs (loop0): mount failed [ 212.757841][T11877] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 212.764563][T11877] EXT4-fs (loop2): mount failed 02:10:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x0) dup3(r1, r0, 0x0) 02:10:18 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 213.105059][T11891] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 213.122204][T11894] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 213.123436][T11891] EXT4-fs (loop4): get root inode failed [ 213.135534][T11894] EXT4-fs (loop2): get root inode failed [ 213.140990][T11891] EXT4-fs (loop4): mount failed 02:10:18 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 213.156265][T11892] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 213.162020][T11894] EXT4-fs (loop2): mount failed [ 213.180139][T11908] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) [ 213.186335][T11892] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:10:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 213.207976][T11892] EXT4-fs (loop0): mount failed 02:10:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x0) dup3(r1, r0, 0x0) 02:10:18 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) [ 213.346031][T11916] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 213.358267][T11916] EXT4-fs (loop4): get root inode failed [ 213.364000][T11916] EXT4-fs (loop4): mount failed 02:10:18 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(0xffffffffffffffff, r0, 0x0) [ 213.469594][T11926] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) [ 213.503288][T11928] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated 02:10:18 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 213.527468][T11928] EXT4-fs (loop2): get root inode failed [ 213.533211][T11928] EXT4-fs (loop2): mount failed [ 213.560956][T11939] EXT4-fs error (device loop0): ext4_quota_enable:6002: comm syz-executor.0: Bad quota inode # 3 [ 213.576434][T11940] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 213.577405][T11939] EXT4-fs warning (device loop0): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 213.590184][T11940] EXT4-fs (loop4): get root inode failed [ 213.603031][T11939] EXT4-fs (loop0): mount failed [ 213.609113][T11940] EXT4-fs (loop4): mount failed 02:10:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:18 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 213.748312][T11949] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) 02:10:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 02:10:18 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) [ 213.866006][T11962] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 213.878259][T11962] EXT4-fs (loop0): get root inode failed [ 213.883922][T11962] EXT4-fs (loop0): mount failed 02:10:18 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 213.906287][T11964] EXT4-fs error (device loop2): ext4_fill_super:4587: inode #2: comm syz-executor.2: iget: root inode unallocated [ 213.925841][T11964] EXT4-fs (loop2): get root inode failed [ 213.933904][T11964] EXT4-fs (loop2): mount failed [ 213.937533][T11970] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated 02:10:18 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 213.951559][T11970] EXT4-fs (loop4): get root inode failed [ 213.957250][T11970] EXT4-fs (loop4): mount failed 02:10:19 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 02:10:19 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) 02:10:19 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 214.176801][T11993] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 214.189035][T11995] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 214.193967][T11993] EXT4-fs (loop4): get root inode failed [ 214.202701][T11995] EXT4-fs (loop0): get root inode failed [ 214.207190][T11993] EXT4-fs (loop4): mount failed [ 214.216829][T11995] EXT4-fs (loop0): mount failed [ 214.223718][T11994] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 214.235741][T11994] EXT4-fs (loop2): group descriptors corrupted! 02:10:19 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, 0xffffffffffffffff, 0x0) [ 214.304508][T12012] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 214.323077][T12012] EXT4-fs (loop1): mount failed 02:10:19 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 214.464624][T12022] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 214.477212][T12026] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 214.487336][T12026] EXT4-fs (loop2): group descriptors corrupted! [ 214.488080][T12021] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated 02:10:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(0xffffffffffffffff, r0, 0x0) [ 214.521357][T12022] EXT4-fs (loop0): get root inode failed [ 214.528354][T12022] EXT4-fs (loop0): mount failed [ 214.531065][T12021] EXT4-fs (loop4): get root inode failed [ 214.539544][T12021] EXT4-fs (loop4): mount failed 02:10:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, 0xffffffffffffffff, 0x0) 02:10:19 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 214.648509][T12041] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 214.658478][T12041] EXT4-fs (loop2): group descriptors corrupted! [ 214.673676][T12040] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 214.691100][T12040] EXT4-fs (loop1): mount failed 02:10:19 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 02:10:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, 0xffffffffffffffff, 0x0) [ 214.997430][T12063] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 215.010728][T12062] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 215.026545][T12068] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 215.031426][T12062] EXT4-fs (loop2): group descriptors corrupted! 02:10:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 215.046182][T12063] EXT4-fs (loop0): get root inode failed [ 215.053293][T12067] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 215.053799][T12068] EXT4-fs (loop4): get root inode failed [ 215.068708][T12067] EXT4-fs (loop1): mount failed 02:10:20 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 215.106353][T12068] EXT4-fs (loop4): mount failed [ 215.111284][T12063] EXT4-fs (loop0): mount failed [ 215.208506][T12088] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 215.223422][T12088] EXT4-fs (loop2): group descriptors corrupted! 02:10:20 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 02:10:20 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 02:10:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 215.346528][T12093] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 215.360847][T12093] EXT4-fs (loop1): mount failed 02:10:20 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 215.436963][T12104] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 215.450663][T12104] EXT4-fs (loop4): get root inode failed [ 215.456519][T12104] EXT4-fs (loop4): mount failed 02:10:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ff", 0x3d, 0x600}], 0x0, &(0x7f00000000c0)={[{@shortname_lower}, {@fat=@check_strict}]}) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x0) 02:10:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 215.504810][T12101] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 215.517861][T12101] EXT4-fs (loop0): get root inode failed [ 215.523661][T12101] EXT4-fs (loop0): mount failed [ 215.544366][T12118] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 215.562489][T12118] EXT4-fs (loop1): mount failed [ 215.571172][T12119] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 215.582742][T12127] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 215.585267][T12119] EXT4-fs (loop2): group descriptors corrupted! [ 215.595185][T12127] EXT4-fs (loop4): get root inode failed [ 215.607222][T12127] EXT4-fs (loop4): mount failed 02:10:20 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) dup3(r2, r0, 0x0) 02:10:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:20 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:20 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 215.810384][T12126] FAT-fs (loop3): Directory bread(block 6) failed [ 215.838982][T12141] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated 02:10:20 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 215.852081][T12140] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 215.867964][T12140] EXT4-fs (loop1): mount failed [ 215.869979][T12141] EXT4-fs (loop0): get root inode failed [ 215.873283][T12136] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 215.879922][T12141] EXT4-fs (loop0): mount failed [ 215.892263][T12136] EXT4-fs (loop4): get root inode failed [ 215.901696][T12136] EXT4-fs (loop4): mount failed [ 215.947601][T12145] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 215.957588][T12145] EXT4-fs (loop2): group descriptors corrupted! 02:10:21 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 216.069143][T12156] EXT4-fs error (device loop3): ext4_fill_super:4587: inode #2: comm syz-executor.3: iget: root inode unallocated [ 216.087521][T12156] EXT4-fs (loop3): get root inode failed [ 216.094253][T12156] EXT4-fs (loop3): mount failed [ 216.105507][T12164] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 02:10:21 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 216.119671][T12164] EXT4-fs (loop1): mount failed [ 216.137446][T12168] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 216.147266][T12168] EXT4-fs (loop2): group descriptors corrupted! [ 216.197407][T12171] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 216.210105][T12171] EXT4-fs (loop0): get root inode failed [ 216.216354][T12171] EXT4-fs (loop0): mount failed [ 216.227996][T12172] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated 02:10:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) [ 216.229112][T12176] EXT4-fs warning (device loop5): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 216.254573][T12172] EXT4-fs (loop4): get root inode failed [ 216.254736][T12176] EXT4-fs (loop5): mount failed [ 216.260530][T12172] EXT4-fs (loop4): mount failed 02:10:21 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) dup3(r2, r0, 0x0) [ 216.430610][T12192] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 216.445228][T12192] EXT4-fs (loop1): mount failed [ 216.452868][T12198] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 216.461157][T12201] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 216.463125][T12198] EXT4-fs (loop2): group descriptors corrupted! 02:10:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) dup3(r2, r0, 0x0) [ 216.475777][T12196] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 216.481310][T12201] EXT4-fs (loop4): get root inode failed [ 216.494125][T12196] EXT4-fs (loop0): get root inode failed [ 216.499845][T12201] EXT4-fs (loop4): mount failed [ 216.505500][T12196] EXT4-fs (loop0): mount failed 02:10:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) dup3(r2, r0, 0x0) 02:10:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) dup3(r2, r0, 0x0) [ 216.795958][T12219] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 216.806023][T12226] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 216.812237][T12219] EXT4-fs (loop2): group descriptors corrupted! [ 216.825826][T12226] EXT4-fs (loop4): get root inode failed [ 216.826856][T12222] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 02:10:21 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 216.832041][T12226] EXT4-fs (loop4): mount failed [ 216.848008][T12222] EXT4-fs (loop1): mount failed 02:10:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 216.894235][T12234] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 216.909156][T12234] EXT4-fs (loop0): get root inode failed [ 216.918089][T12234] EXT4-fs (loop0): mount failed 02:10:22 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x8, 0x0, 0x2) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup3(r2, r0, 0x0) 02:10:22 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 217.094266][T12249] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 217.103859][T12249] EXT4-fs (loop2): group descriptors corrupted! 02:10:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) dup3(r2, r0, 0x0) [ 217.202574][T12254] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 217.221152][T12255] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 217.237364][T12262] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) 02:10:22 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x8, 0x0, 0x2) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup3(r2, r0, 0x0) [ 217.243236][T12255] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 217.251895][T12262] EXT4-fs (loop2): group descriptors corrupted! [ 217.261873][T12255] EXT4-fs (loop1): mount failed [ 217.268691][T12254] EXT4-fs (loop4): get root inode failed [ 217.281025][T12254] EXT4-fs (loop4): mount failed 02:10:22 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 217.307598][T12263] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 217.321047][T12263] EXT4-fs (loop0): get root inode failed [ 217.327333][T12263] EXT4-fs (loop0): mount failed 02:10:22 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x8, 0x0, 0x2) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup3(r2, r0, 0x0) 02:10:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) dup3(r2, r0, 0x0) [ 217.567259][T12281] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 217.578188][T12281] EXT4-fs (loop2): group descriptors corrupted! [ 217.602751][T12285] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 217.613802][T12282] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 217.619065][T12285] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 217.621180][T12282] EXT4-fs (loop4): mount failed [ 217.634876][T12285] EXT4-fs (loop1): mount failed [ 217.673007][T12291] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 217.686520][T12291] EXT4-fs (loop0): get root inode failed [ 217.692199][T12291] EXT4-fs (loop0): mount failed 02:10:22 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 217.934437][T12313] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 217.940910][T12313] EXT4-fs (loop4): mount failed [ 217.948592][T12319] EXT4-fs warning (device loop5): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 217.965729][T12310] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 217.969486][T12319] EXT4-fs (loop5): mount failed [ 217.978475][T12310] EXT4-fs (loop2): group descriptors corrupted! [ 217.980811][T12311] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 217.998450][T12311] EXT4-fs (loop0): get root inode failed [ 218.004071][T12311] EXT4-fs (loop0): mount failed 02:10:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 218.068561][T12329] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 218.082557][T12329] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 218.098513][T12325] EXT4-fs warning (device loop3): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 218.111286][T12329] EXT4-fs (loop1): mount failed 02:10:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x8, 0x0, 0x2) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup3(r2, r0, 0x0) [ 218.118703][T12325] EXT4-fs (loop3): mount failed 02:10:23 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 218.220029][T12340] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 218.232587][T12340] EXT4-fs (loop0): get root inode failed [ 218.238902][T12340] EXT4-fs (loop0): mount failed [ 218.281056][T12351] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 218.282150][T12346] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 218.291778][T12348] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 218.298605][T12346] EXT4-fs (loop4): mount failed [ 218.307508][T12351] EXT4-fs (loop2): group descriptors corrupted! 02:10:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 218.317753][T12348] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 218.351173][T12348] EXT4-fs (loop1): mount failed 02:10:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 218.437215][T12358] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 218.469957][T12367] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated 02:10:23 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 218.485988][T12368] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 218.490757][T12358] EXT4-fs (loop3): group descriptors corrupted! [ 218.507321][T12371] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 218.514607][T12367] EXT4-fs (loop4): get root inode failed [ 218.522987][T12382] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 218.540828][T12368] EXT4-fs (loop0): get root inode failed [ 218.541162][T12371] EXT4-fs warning (device loop5): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 218.559277][T12367] EXT4-fs (loop4): mount failed [ 218.575173][T12368] EXT4-fs (loop0): mount failed 02:10:23 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a543) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) connect(r4, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012584, 0x0, 0xfffffe53) splice(r0, 0x0, r2, 0x0, 0x6cc253fb, 0x0) 02:10:23 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 218.586559][T12385] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 218.598136][T12382] EXT4-fs (loop2): group descriptors corrupted! [ 218.608326][T12385] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 218.624926][T12371] EXT4-fs (loop5): mount failed [ 218.633359][T12385] EXT4-fs (loop1): mount failed 02:10:23 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e6803251000000000000416600", 0x23, 0x600}], 0x0, &(0x7f00000000c0)={[{@shortname_lower}, {@fat=@check_strict}]}) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x0) [ 218.878621][T12396] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 218.897118][T12396] EXT4-fs (loop0): get root inode failed [ 218.904907][T12396] EXT4-fs (loop0): mount failed [ 218.932013][T12397] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 218.946084][T12401] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 218.950259][T12397] EXT4-fs (loop2): group descriptors corrupted! [ 218.955770][T12401] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:10:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:24 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 218.981516][T12401] EXT4-fs (loop1): mount failed [ 218.993237][T12407] FAT-fs (loop5): Directory bread(block 6) failed 02:10:24 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.022172][T12406] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 219.042134][T12417] FAT-fs (loop5): Directory bread(block 6) failed [ 219.058576][T12406] EXT4-fs (loop4): get root inode failed [ 219.064831][T12406] EXT4-fs (loop4): mount failed 02:10:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffff", 0x34, 0x600}], 0x0, &(0x7f00000000c0)={[{@shortname_lower}, {@fat=@check_strict}]}) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x0) 02:10:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.099508][T12419] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 219.119042][T12420] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 219.130312][T12420] EXT4-fs (loop2): group descriptors corrupted! [ 219.136987][T12419] EXT4-fs (loop0): get root inode failed 02:10:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.147222][T12419] EXT4-fs (loop0): mount failed [ 219.230063][T12432] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 219.250417][T12425] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 219.268793][T12433] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 219.284460][T12432] EXT4-fs (loop4): get root inode failed [ 219.291907][T12433] EXT4-fs (loop2): group descriptors corrupted! [ 219.298773][T12425] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 219.304491][T12439] FAT-fs (loop5): Directory bread(block 6) failed 02:10:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r2, r0, 0x0) 02:10:24 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.331985][T12432] EXT4-fs (loop4): mount failed [ 219.339203][T12425] EXT4-fs (loop1): mount failed 02:10:24 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.471688][T12447] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 219.490999][T12445] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 219.507910][T12447] EXT4-fs (loop2): group descriptors corrupted! [ 219.508911][T12445] EXT4-fs (loop0): get root inode failed 02:10:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.520591][T12445] EXT4-fs (loop0): mount failed 02:10:24 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.551189][T12457] EXT4-fs error (device loop5): ext4_fill_super:4587: inode #2: comm syz-executor.5: iget: root inode unallocated [ 219.554085][T12456] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 219.564999][T12457] EXT4-fs (loop5): get root inode failed [ 219.573340][T12456] EXT4-fs (loop4): group descriptors corrupted! [ 219.580085][T12457] EXT4-fs (loop5): mount failed [ 219.718732][T12465] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 219.728407][T12465] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 219.742748][T12465] EXT4-fs (loop1): mount failed 02:10:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}]}, 0x1c}}, 0x8000) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x8, 0x0, 0x2) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup3(r2, r0, 0x0) [ 219.775011][T12468] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 219.785237][T12468] EXT4-fs (loop2): group descriptors corrupted! 02:10:24 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.826817][T12477] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 219.842126][T12477] EXT4-fs (loop0): get root inode failed [ 219.847867][T12477] EXT4-fs (loop0): mount failed 02:10:24 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.927197][T12486] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 219.932541][T12483] EXT4-fs warning (device loop5): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 219.951642][T12483] EXT4-fs (loop5): mount failed [ 219.954871][T12486] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 219.971045][T12486] EXT4-fs (loop1): mount failed 02:10:25 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffff", 0x34, 0x600}], 0x0, &(0x7f00000000c0)={[{@shortname_lower}, {@fat=@check_strict}]}) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x0) 02:10:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 219.979204][T12495] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 219.989456][T12484] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 219.992028][T12495] EXT4-fs (loop2): group descriptors corrupted! [ 219.999349][T12484] EXT4-fs (loop4): group descriptors corrupted! 02:10:25 executing program 3 (fault-call:11 fault-nth:0): r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:25 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:25 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 220.216015][T12507] FAT-fs (loop5): Directory bread(block 6) failed [ 220.256586][T12504] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 220.263381][T12518] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 220.270944][T12504] EXT4-fs (loop0): mount failed [ 220.290518][T12513] FAULT_INJECTION: forcing a failure. [ 220.290518][T12513] name failslab, interval 1, probability 0, space 0, times 1 [ 220.296921][T12518] EXT4-fs (loop2): group descriptors corrupted! [ 220.308605][T12513] CPU: 1 PID: 12513 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 220.319618][T12513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.329673][T12513] Call Trace: [ 220.332958][T12513] dump_stack+0x1d8/0x24e [ 220.337274][T12513] ? devkmsg_release+0x11c/0x11c [ 220.342645][T12513] ? show_regs_print_info+0x12/0x12 [ 220.347843][T12513] should_fail+0x6f6/0x860 [ 220.352242][T12513] ? setup_fault_attr+0x3d0/0x3d0 [ 220.357247][T12513] ? mempool_alloc_slab+0x16/0x20 [ 220.362244][T12513] should_failslab+0x5/0x20 [ 220.366721][T12513] kmem_cache_alloc+0x36/0x290 [ 220.371488][T12513] ? debug_smp_processor_id+0x20/0x20 [ 220.376845][T12513] ? check_preemption_disabled+0x9e/0x330 [ 220.382534][T12513] ? mempool_free+0x380/0x380 [ 220.387188][T12513] mempool_alloc_slab+0x16/0x20 [ 220.392035][T12513] mempool_alloc+0x113/0x680 [ 220.396764][T12513] ? check_preemption_disabled+0x154/0x330 [ 220.402663][T12513] ? debug_smp_processor_id+0x20/0x20 [ 220.408023][T12513] ? check_preemption_disabled+0x154/0x330 [ 220.414074][T12513] ? mempool_resize+0x900/0x900 [ 220.418926][T12513] ? debug_smp_processor_id+0x20/0x20 [ 220.424281][T12513] ? __rcu_read_lock+0x50/0x50 [ 220.429024][T12513] bio_alloc_bioset+0x1db/0x640 [ 220.433857][T12513] ? __test_set_page_writeback+0x897/0x9e0 [ 220.439662][T12513] ? bio_chain_endio+0x110/0x110 [ 220.444816][T12513] ? test_clear_page_writeback+0x7a0/0x7a0 [ 220.450615][T12513] ? rmap_walk+0xd0/0xd0 [ 220.454844][T12513] submit_bh_wbc+0x1ba/0x790 [ 220.459417][T12513] ? create_page_buffers+0x156/0x1c0 [ 220.464706][T12513] __block_write_full_page+0x862/0xe50 [ 220.470147][T12513] ? mark_buffer_write_io_error+0x1e0/0x1e0 [ 220.476018][T12513] ? blkdev_direct_IO+0x1fd0/0x1fd0 [ 220.481194][T12513] __writepage+0x5d/0x110 [ 220.485498][T12513] write_cache_pages+0x7d9/0xdc0 [ 220.490412][T12513] ? generic_writepages+0x160/0x160 [ 220.495585][T12513] ? tag_pages_for_writeback+0x570/0x570 [ 220.501195][T12513] generic_writepages+0xf8/0x160 [ 220.506108][T12513] ? clear_page_dirty_for_io+0x650/0x650 [ 220.511717][T12513] ? _raw_spin_lock+0xa3/0x1b0 [ 220.516464][T12513] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 220.521809][T12513] ? blkdev_readpage+0x20/0x20 [ 220.526555][T12513] do_writepages+0x13a/0x280 [ 220.531121][T12513] ? __writepage+0x110/0x110 [ 220.535688][T12513] ? dqput+0x770/0x770 [ 220.539732][T12513] filemap_flush+0x274/0x340 [ 220.544318][T12513] ? filemap_fdatawrite_range+0x390/0x390 [ 220.550042][T12513] ? ext4_put_super+0xc00/0xc00 [ 220.554865][T12513] ? get_nr_dirty_inodes+0x23b/0x2a0 [ 220.560124][T12513] ? ext4_put_super+0xc00/0xc00 [ 220.564967][T12513] sync_filesystem+0x131/0x200 [ 220.569706][T12513] generic_shutdown_super+0x6b/0x2a0 [ 220.574983][T12513] kill_block_super+0x79/0xd0 [ 220.579635][T12513] deactivate_locked_super+0xaf/0x100 [ 220.584978][T12513] deactivate_super+0x1b3/0x270 [ 220.589802][T12513] ? deactivate_locked_super+0x100/0x100 [ 220.595407][T12513] ? dput+0x4de/0x5d0 [ 220.599361][T12513] ? _raw_spin_lock_irqsave+0x210/0x210 [ 220.604898][T12513] ? find_next_bit+0xc6/0x110 [ 220.609563][T12513] cleanup_mnt+0x432/0x4e0 [ 220.613953][T12513] task_work_run+0x186/0x1b0 [ 220.618516][T12513] prepare_exit_to_usermode+0x2b0/0x310 [ 220.624037][T12513] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 220.629901][T12513] RIP: 0033:0x4665d9 [ 220.633871][T12513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:10:25 executing program 5 (fault-call:4 fault-nth:0): r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) [ 220.653450][T12513] RSP: 002b:00007f22d0db2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 220.661832][T12513] RAX: 0000000000000005 RBX: 000000000056bf80 RCX: 00000000004665d9 [ 220.669793][T12513] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 220.677827][T12513] RBP: 00007f22d0db21d0 R08: 0000000000000000 R09: 0000000000000000 [ 220.685772][T12513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.693716][T12513] R13: 00007ffc4a7e39ef R14: 00007f22d0db2300 R15: 0000000000022000 02:10:25 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 220.717806][T12521] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 220.729654][T12524] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 220.744034][T12521] EXT4-fs (loop4): group descriptors corrupted! [ 220.750838][T12524] EXT4-fs (loop1): mount failed 02:10:25 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:25 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:25 executing program 3 (fault-call:11 fault-nth:1): r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 220.972255][T12541] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 220.982330][T12547] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 220.992369][T12547] EXT4-fs (loop4): group descriptors corrupted! [ 221.004090][T12541] EXT4-fs (loop2): group descriptors corrupted! 02:10:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) [ 221.007052][T12538] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 221.010824][T12535] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 221.027007][T12538] EXT4-fs (loop1): mount failed [ 221.033414][T12535] EXT4-fs (loop0): mount failed 02:10:26 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 221.240405][T12562] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 221.253000][T12562] EXT4-fs (loop2): group descriptors corrupted! 02:10:26 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 221.316528][T12560] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 221.332740][T12569] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 221.335269][T12560] EXT4-fs (loop1): mount failed [ 221.346838][T12569] EXT4-fs (loop4): group descriptors corrupted! 02:10:26 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 221.370163][T12581] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 221.389906][T12581] EXT4-fs (loop2): group descriptors corrupted! [ 221.397936][T12577] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 221.405339][T12577] EXT4-fs (loop0): mount failed 02:10:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0xffffffff00000000) 02:10:26 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x2) 02:10:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 221.654510][T12595] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 221.671007][T12593] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 221.689236][T12595] EXT4-fs (loop4): group descriptors corrupted! 02:10:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x93, 0x3, 0xff, 0x29, 0x0, 0x2, 0x31820, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1547004d, 0x2, @perf_bp={&(0x7f0000000040), 0xc}, 0x2000, 0x81, 0x30d749e6, 0x8, 0xfffffffffffffffb, 0x6, 0x8001, 0x0, 0x9, 0x0, 0xfffffffffffffff7}, 0x0, 0x7, r1, 0xb) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) [ 221.694472][T12592] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 221.701200][T12593] EXT4-fs (loop0): get root inode failed [ 221.710294][T12592] EXT4-fs (loop1): mount failed [ 221.716509][T12593] EXT4-fs (loop0): mount failed 02:10:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:26 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x3) [ 221.915641][T12621] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 221.943645][T12621] EXT4-fs (loop4): group descriptors corrupted! 02:10:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x100000c, 0x10, r0, 0xddd8e000) [ 222.045713][T12630] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 222.068607][T12630] EXT4-fs (loop0): get root inode failed [ 222.078817][T12630] EXT4-fs (loop0): mount failed [ 222.100866][T12640] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 222.115750][T12640] EXT4-fs (loop1): mount failed 02:10:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x4) 02:10:27 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 222.142045][T12643] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 222.155043][T12643] EXT4-fs (loop4): group descriptors corrupted! 02:10:27 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x20) dup3(r1, r0, 0x0) 02:10:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 222.337618][T12664] EXT4-fs error (device loop0): ext4_fill_super:4587: inode #2: comm syz-executor.0: iget: root inode unallocated [ 222.355580][T12664] EXT4-fs (loop0): get root inode failed [ 222.361317][T12664] EXT4-fs (loop0): mount failed [ 222.542016][T12674] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 222.554155][T12674] EXT4-fs (loop4): group descriptors corrupted! [ 222.570929][T12671] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 02:10:27 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 222.599703][T12671] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 222.623328][T12671] EXT4-fs (loop1): mount failed 02:10:27 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x5) [ 222.692285][T12693] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 222.703575][T12693] EXT4-fs (loop0): group descriptors corrupted! 02:10:27 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 222.902918][T12700] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 222.918548][T12700] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 222.933059][T12700] EXT4-fs (loop1): mount failed 02:10:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x10, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) [ 222.993486][T12713] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 223.009749][T12716] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 223.030920][T12713] EXT4-fs (loop4): group descriptors corrupted! 02:10:28 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x6) [ 223.039183][T12716] EXT4-fs (loop0): group descriptors corrupted! 02:10:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x1000, 0x6, &(0x7f00000018c0)=[{&(0x7f0000000340)="9175a557f2f91f4ee0537914f59023d86f497ae323e0ed1448f959f9ae1f6484310957567b6331c71e13b709bf070ac9a0e4ba19eab5196428ac5a70c5abacd76552951313114826b7ec477113768e331e7473d3e06831cb1c8bbe5091e2f8eba25d817983fcee3f4916a857c68d873166b5b5cb02f5242f628330aed06d78ef55120e733b32fb9e05f8278987f2c1", 0x8f, 0x6}, {&(0x7f0000000400)="493ad663851968f9302c468e85b1ed1d43f48acb899cdbb0d5ff8fa64f7b33652f301d4898425aa12d20fa633abd5ebca96efedf33c2c5951e532878a256961cf4cbde959a73167bf4ccf4aedbbf0b4caa449db850439cdaf66d7a0c260c85d9397d5e53238e22cb5992aac14c2841c898d3b8469fc90f957566fcc999a210333d788046670b99c3267aa92960818ee5f91fd92d7765", 0x96, 0x7}, {&(0x7f0000000740)="6f7474bbe2aaf034d14ae54b43d126b07fcd11d3d8b4a39f500967dc60a849d09a65424600a3d9ce739caab9aa4b5757a4cf213d7775abd9bae45f54f76eeaa3bf4639759d5c791ca0ffa1f6f7a4d2f9b156ef6433286edac3d0cb99eedc10f8456e7672ee96360313c5a03d7f266b8b215a5f4e7eb3a8648c29cb39114eb1eaf9b7c9dad1015c51", 0x88, 0x6}, {&(0x7f00000004c0)="344ed8e6884ad1b3d328472e", 0xc, 0x200}, {&(0x7f0000000800)="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", 0x1000, 0x6}, {&(0x7f0000001800)="0216359fb23e9fe297217dedcf85174f2a5518d6050dd40cf0ca48e2f0da73189179e4056147942ada827708739788d2967878219bab696cb6123be716718ffc00b2c31b1cf21e16b5ed8e67936ff9f83c14bb0668766a9835d435f19fd416403bd61e4a5748db68a4b4e88b1941fc3a3e4b4a06f97f958c9997e9c93250f15d888abca84deb466b26e820e87cb5a7fa95da51e4ecb45563653c29ee7ec21dae06bdbe3fdbd664dbca7c28", 0xab, 0x1}], 0x204000, &(0x7f0000001980)={[{@journal_async_commit}, {@nomblk_io_submit}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@nomblk_io_submit}], [{@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}]}) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001300)={0x2880008, r2}) syz_mount_image$vfat(&(0x7f0000001a40), &(0x7f0000001a80)='./file0\x00', 0x4, 0x3, &(0x7f0000001d40)=[{&(0x7f0000001ac0)="7e9c3fb35f771ff8f552fc50e3cddabd9dc7b1a57cefedb04599d689d51d174e7b9fa20a1b2bd14542da8d526fad273e4e4f63b5ae9ae63ee41e7a7d6e68c58f5e2b395e5e2246e62030d98ee09a97fd3d804cb02561d357c138e06ab0c9d5e68e67fb886337c17b71fc7ec67370ed9ac1b48d575cf6e4ac20925b108d44d70a5c7efb593f0eb870c3c036324379a9ef7bd35723291a0dfadcf54d34fd645959c3acda9ecf25e2d89822d6906361c69b87fbe8ee9087629d04e853fbb7841cccda858fae7e8264cd254d52fffa05c1490dd4ff40d1e2414ba2fad4e5d78d3d88", 0xe0, 0x8}, {&(0x7f0000001bc0)="42f6baf67d62f79c09708b971221321d3a6ea5435100dcb72496bf53b643cc6dcf5592cba786de50f531f05593272e18eca97936519df658e21aec8833fdb19d5004df36ed34a4095e48b567efd862030c0afb626570eb8db1a3fa2fa41592bae5e03ed62f0d8a858b4552c15220e64afc0c3a0808192abb3c6357da2226cbd462ae91164a4f55868efdbd54c24eeed55e139e411519ba87306d9da38f07db21ffdc38d31b0b561b4fbad4fe80397ff0e5bb2f62e35baf", 0xb7, 0xffff}, {&(0x7f0000001c80)="089288ab8347aa3a126d57decb617292e139f8bfda1f09cf49ddd63bc4273c9364a203416a7da4cf1f61c8ba1f4d019be2d24b5de58dc0b8e4473d751b855c2e78ef556377aef834e2e387e340761b3b7279aa7fe2151e71b9cb9fab5f4759510ab4fbbdc63607923402cb8887984d3e66fcc6fe092f3bb21fb1d4f27db154fd8c3b81ad5aab11ebeba4aae2979664eb103f1a82a939f187a337b27f8f9a91db41266695b5622b7cbc3ee17993a52348b0643311bd9c506b0328850520c940de", 0xc0, 0x7}], 0x1000804, &(0x7f0000001dc0)={[{@rodir}, {@rodir}, {@shortname_lower}, {@uni_xlateno}, {@utf8}, {@rodir}, {@numtail}, {@fat=@dmask={'dmask', 0x3d, 0x5}}], [{@obj_user={'obj_user', 0x3d, ']'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@dont_hash}, {@appraise}, {@fsname={'fsname', 0x3d, 'nomblk_io_submit'}}, {@uid_lt={'uid<', 0xee00}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = dup3(r1, r0, 0x0) openat$cgroup_ro(r2, &(0x7f0000001a00)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f4010000100000022bbd7000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x1f4}, 0x1, 0x0, 0x0, 0x4000010}, 0x8004) [ 223.273330][T12736] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 223.284872][T12736] EXT4-fs (loop4): group descriptors corrupted! 02:10:28 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 223.316856][T12733] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 223.328692][T12733] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 223.343340][T12733] EXT4-fs (loop1): mount failed 02:10:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 223.401654][T12748] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 223.411474][T12748] EXT4-fs (loop0): group descriptors corrupted! 02:10:28 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x7) 02:10:28 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 223.544010][T12759] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 223.561527][T12761] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 223.575152][T12759] EXT4-fs (loop4): group descriptors corrupted! [ 223.581624][T12761] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:10:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 223.628584][T12761] EXT4-fs (loop1): mount failed [ 223.671531][T12776] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 223.681367][T12776] EXT4-fs (loop0): group descriptors corrupted! [ 223.695321][T12779] FAT-fs (loop5): Unrecognized mount option "obj_user=]" or missing value 02:10:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 223.851619][T12782] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 223.861056][T12782] EXT4-fs (loop4): group descriptors corrupted! 02:10:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:28 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x8) 02:10:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x1300005, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) [ 223.913907][T12762] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 223.937296][T12792] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 223.947503][T12792] EXT4-fs (loop0): group descriptors corrupted! 02:10:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 224.083695][T12804] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 224.097566][T12804] EXT4-fs (loop4): group descriptors corrupted! [ 224.110400][T12800] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 224.123875][T12800] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 224.139042][T12800] EXT4-fs (loop1): mount failed 02:10:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x3}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r2, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)={0x18c, 0x18, 0x1, 0x0, 0x0, "", [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="f800055263bafcd380b69bc384f95d8d126c328bd06df3710943c071f91367ad876b3c41f5b381d855b007812874be9add047722998096a3932819689ddee40333344e5656b1b7c00d2b72d16a5e548e165c2041705c201e0068a9d68186161bf28f395a65d38a638d6daa798680f2269a10bf51827b970322d3706d3bc9f6f3fb04603ac47469377f97c25157c5242f80f719f58509c9ec2d069220c41e8f8d5a9020b1105253ee54105fbb47a47faff658381144b0ab0791844e17ff5e9ca0cf8e3dae4e8a2383bce59cb6b2872822739ab6c110fb5d8b9b2933fdadc28647a1c2b9221703c1618ccc88c8c3515622afb7", @typed={0x4}, @typed={0x8, 0x78, 0x0, 0x0, @fd=r3}]}, @nested={0x6d, 0x0, 0x0, 0x1, [@generic="5980cd5cb0673668ece4ccf011eb10bf7a2b02ddbcdae6f04f10b35eda5172ec14fcfdfef57f040edf0d3c8ae9a816a18b87477478ea8ee2876fdfd99dc0fb7b6efee8b92c0315ab3ada9b07b1434e634044c50629e4f1fe0d32e55d292bf683e0f56700642656479a"]}]}, 0x18c}], 0x1}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x17, 0x7, @l2={'eth', 0x3a, 'erspan0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4008004}, 0x8880) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x200, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004}, 0x20000887) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x9) 02:10:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 224.329712][T12832] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 224.339685][T12832] EXT4-fs (loop4): group descriptors corrupted! [ 224.346097][T12821] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 224.370000][T12821] EXT4-fs (loop0): group descriptors corrupted! 02:10:29 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 224.479220][T12837] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 224.485225][T12849] IPv6: NLM_F_CREATE should be specified when creating new route [ 224.500640][T12837] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:10:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1040}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000005540)='./file0\x00') r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x27f) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000005840)=[{{&(0x7f00000002c0)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000340)=""/95, 0x5f}, {&(0x7f00000003c0)=""/115, 0x73}, {&(0x7f0000005a80)=""/221, 0xdd}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000600)=""/205, 0xcd}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001800)=""/243, 0xf3}], 0x8, &(0x7f0000001980)=""/189, 0xbd}, 0x5}, {{&(0x7f0000001a40)=@isdn, 0x80, &(0x7f0000005b80)=[{&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/66, 0xfffffffffffffdb3}, {&(0x7f0000002ac0)=""/247, 0xf7}, {&(0x7f0000002bc0)=""/194, 0xc2}, {&(0x7f00000000c0)=""/26, 0x1a}, {&(0x7f0000000180)=""/29}, {&(0x7f0000000440)=""/251}], 0x5, &(0x7f0000000180)}, 0xffffffff}, {{&(0x7f0000002d40)=@xdp, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002dc0)=""/196, 0xc4}], 0x1, &(0x7f0000002f00)=""/92, 0x5c}, 0x3}, {{&(0x7f0000002f80)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003080)=[{&(0x7f0000003000)=""/84, 0x54}], 0x1, &(0x7f00000030c0)=""/4096, 0x1000}, 0xb9}, {{&(0x7f00000040c0), 0x80, &(0x7f0000004600)=[{&(0x7f0000004140)=""/32, 0x20}, {&(0x7f0000004180)=""/225, 0xe1}, {&(0x7f0000004280)=""/33, 0x21}, {&(0x7f00000042c0)=""/188, 0xbc}, {&(0x7f0000004380)=""/17, 0x11}, {&(0x7f00000043c0)=""/177, 0xb1}, {&(0x7f0000004480)=""/49, 0x31}, {&(0x7f00000044c0)=""/192, 0xc0}, {&(0x7f0000004580)=""/111, 0x6f}], 0x9, &(0x7f00000046c0)=""/204, 0xcc}}, {{0x0, 0x0, &(0x7f0000004800)=[{&(0x7f00000047c0)=""/22, 0x16}], 0x1}, 0x7}, {{&(0x7f0000004840)=@sco={0x1f, @none}, 0x80, &(0x7f0000004dc0)=[{&(0x7f00000048c0)=""/45, 0x2d}, {&(0x7f0000004900)=""/69, 0x45}, {&(0x7f0000004980)=""/5, 0x5}, {&(0x7f00000049c0)=""/68, 0x44}, {&(0x7f0000004a40)=""/141, 0x8d}, {&(0x7f0000004b00)=""/1, 0x1}, {&(0x7f0000004b40)=""/245, 0xf5}, {&(0x7f0000004c40)=""/68, 0x44}, {&(0x7f0000004cc0)=""/193, 0xc1}], 0x9, 0x0, 0xfd2e}, 0x20}, {{&(0x7f0000004e80)=@can, 0x80, &(0x7f0000005040)=[{&(0x7f0000004f00)=""/130, 0x82}, {&(0x7f0000004fc0)=""/20, 0x14}, {&(0x7f0000005000)=""/62, 0x3e}], 0x3, &(0x7f0000005080)=""/166, 0xa6}, 0x2}, {{&(0x7f0000005140)=@ipx, 0x80, &(0x7f0000005d00)=[{&(0x7f00000051c0)=""/187, 0xbb}, {&(0x7f0000005280)=""/184, 0xb8}, {&(0x7f0000005340)=""/159, 0x9f}, {&(0x7f0000005400)=""/116, 0x74}, {&(0x7f0000005480)=""/190, 0xbe}, {&(0x7f0000005540)}, {&(0x7f0000005580)=""/90, 0x5a}, {&(0x7f0000005600)=""/154, 0x9a}, {&(0x7f0000005c00)=""/211}], 0x8, &(0x7f0000005740)=""/210, 0xd2}, 0x5}], 0x9, 0x40000041, 0x0) r4 = dup3(r1, r0, 0x0) perf_event_open(&(0x7f00000056c0)={0x0, 0x80, 0x0, 0x8, 0x40, 0x8, 0x0, 0x40, 0x200, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x1, 0x5}, 0x1e220, 0xb15b, 0x0, 0x1, 0x100, 0x8, 0x5, 0x0, 0x7ff, 0x0, 0xe844}, 0xffffffffffffffff, 0x0, r4, 0x1) [ 224.529514][T12850] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 224.530006][T12837] EXT4-fs (loop1): mount failed [ 224.552260][T12850] EXT4-fs (loop4): group descriptors corrupted! 02:10:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 224.729770][T12857] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 224.746428][T12859] EXT4-fs (loop2): unsupported descriptor size 0 [ 224.755544][T12865] EXT4-fs (loop5): couldn't mount as ext3 due to feature incompatibilities [ 224.761127][T12857] EXT4-fs (loop0): group descriptors corrupted! 02:10:29 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xa) [ 224.935509][T12870] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 224.945152][T12870] EXT4-fs (loop4): group descriptors corrupted! [ 224.965937][T12872] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 02:10:30 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 224.977507][T12872] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 224.992131][T12880] EXT4-fs (loop2): unsupported descriptor size 0 [ 224.998785][T12865] EXT4-fs (loop5): couldn't mount as ext3 due to feature incompatibilities 02:10:30 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081b9d100180000daf46502daf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000030", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r1, 0x80000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) connect(r3, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xffffff6a) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000001300)={0x2880008}) r5 = syz_open_dev$vcsu(&(0x7f0000001e40), 0x9, 0x42) r6 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000003400)={0xffffffffffffffff}) io_submit(0x0, 0x5, &(0x7f0000003480)=[&(0x7f0000001b80)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000001b00)="30ff3a45d7a5e1521de3700de84f9526eec6592f4b5705e39749006e704ba034afcaca588823ed7485696fde8925e5b7101020a937d3f05f802e3d6ac07de6ad22451d9014a2ed7f2279af2fbf092533ff8671ca1e5c3e", 0x57, 0x0, 0x0, 0x1, r2}, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x20, r3, &(0x7f0000001bc0)="c75f779671587d2af50ebfc75da4832317995c8f1fa8c02a83565bdb797e97c9c970bb3dde74fdd20869d6bdf116518c66cad514a11bfe620db8de020af3f815cf033953aaefb3b84e709dc89e6a92d933ef2d63cf19597493bd08700848d3cce81bb8deccc16f3ea864b0cfc51e82be277573dfe5afc3638fc296bf494ba6d06c3ca65e68523c7975e52eee1385d8f8841ef6009226420d3ab8ef7e0c323ea251e602d31b83f267420181606bd25799f3fb381766fabb12c6f63cc9af42c677c19c3ed56fc08f59733ed6c3b98e59c36ff7a5b60ce877502b4cf437e97a1103ec5a84e4818e76267eddccd5627d88bc1d87730d2412ce", 0xf7, 0x200, 0x0, 0x3}, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, &(0x7f0000001d00)="f6fa03b70f5b153daebaacb80e83a2e7c1249b60ba3e2cac5e8600c0ca138c161d47e445ea28a6edb46c2cab673c34f95d34d7cd3a5df2009b13d4ec46997aa82f2b47db9e3a2fbd1d528798d8db92725a78803aa6ed59d2522639417c52e08d1f79c66cd5771cc63e95092311c757454098e08eeb60b61cbc4c53388570e1cd23d1ad6f00ad41590f4795c78753a7896286866d4051c306e9bb34310dc869cb493428c73310c06a813d9a5e86210a71d228738f144ed1ae6ac2f4794a767261ea9fe2b3015eb8a0c3f45a7255b1", 0xce, 0x99, 0x0, 0x2, r4}, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x5, 0x8, r5, &(0x7f0000001e80)="72480524cc486d94153529a72f7d7f8d7ed33cbd223f730d94762c4007eac0ae5e4163d7c700627e45ecd5ca44d283b345b9eef5e342f4fa", 0x38, 0x2, 0x0, 0x2, r2}, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x6, 0x1, r6, &(0x7f0000003300)="d7da43690e0a7241dcf599fa0936363b4e5b48a856c675c004dfd2661e375c94b4010755348402a1a86d7b62f71f27bd6a16babbdf8cbcfd26f83c0f4b24f53843452e5bb6cde008c2965deb147689ac9c8a5eb5d36d6fc4b7324e777ca1534cf85afd84e14ce54aff50d232825f9595f57445131db86dcb1c341b3ae20e69f3371511789b49da80512cc52650215ba0e44863b33bdd986fd62b20154d2c58ab3dbf3342ae6e912e083ac17b2b2db9682ea684955a12c85bc8fb02719871a7f05c04743b8f8b529fcaeb756cabb2c064aeedae9cf27e8e9c9addcec8996991330e23", 0xe2, 0x1, 0x0, 0x2, r7}]) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) connect(r8, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) sendmmsg(r8, &(0x7f0000001a80)=[{{&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x4, 0x0, 0x0, 0x4, {0xa, 0x4e24, 0xf5, @empty, 0x10000}}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000340)="4220cd6b9295388751c816b7f030bc0f8a03c444d5064678340d448debdd534320bbc8a05ba04822d74864cdb92d732e1a3f5e5344e9dedcc4ec6e1e9eb44ec042cd7ec4db36a48c17d3853ca0175e608e678839789d2f3ad09b143beb982f3dd317e017841c9ee76e06fc2d7840f95d549e8b0cfcee009014f9acf64baf0f6534ec192e1c66c605b83998fd712b8c5b39d8261e37d5844e5431d641ad4e165baf2da369", 0xa4}], 0x1, &(0x7f0000001f00)=ANY=[@ANYBLOB="c8000000000000000c01000008000000746edf1e432beff864e4309144b5fa8a01ff574ea9fcb573bd45cd220cfee0dd64e53a0e8504680b586800f26014e532a269e33c710f55812855f11127f7678d39d30fae598d31c3518ebecb1501c66cc83f65e592348597012c550c14860438c132dbdd0a7d75c9c296e1fb8ac0799a11fea3c30f093ee497fd1bedd85a4132db4d563bd05ee2a91d8450c255b22ef9032f6a5457546c9e7d2f786af035760d1b1f2d0019546c564dcff7bfbe245b9efa47c27d0d65d832dd8297f38473fe5fd2a51a6e42494c27a577e8a231d98d5eaa488565672cac6c25beeb416b2b24a5f2c5354a99b14f"], 0xc8}}, {{&(0x7f0000000500)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000580)="cf7da39debd44030143645b5cfc6bef3bf5f784f06b6cb4881f7a335faddbb4a4ec2e0801179ddc92e55acf60f30ac649b23c617364aaa5a29b94116a13a3e331e241ea6dbfd086fb7b4eb0e4a55eca9d56103591828ebef811e0d227572fd77b326a0d903c51f3a2da1097f7d12f27622082fd8777b478347e84ca11ae83ba549baa8631eaf7329e9ae258aa87db67d4ee973872198d3adec4463ac9c4cf243ad", 0xa1}, {&(0x7f0000000180)="8c90b35193466da02b7f6cfd22f7c40fa8b94a47138757d7e53d6d011e75e36de5359694f4ed76582715ac482af27690c6c967b947455b90f8ae", 0x3a}, {&(0x7f0000000640)="0aff28bcc7d531d71d31d563f65a1113cdc5049d8fac3f894e373c3e0f04a08c5d63ea1e438b370c08cd5fc151ceebf413678179afc0af4eb3ea937512943db79a951cdb1e895185210f019589454483c75f0fbbe215f20419eedb33e3478c7b204065ffa450a788a2fa3b73f6d8ca401b131e36f0f7b4650364fa737e4206d8f1c7c95fd06284edf24a9a7eaf4b2396eafb252857f7f57bdbef", 0x9a}, {&(0x7f0000000700)="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", 0x1000}], 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x330}}], 0x2, 0x20040045) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) [ 225.048840][T12872] EXT4-fs (loop1): mount failed 02:10:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 225.140281][T12893] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 225.152146][T12890] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 225.153547][T12893] EXT4-fs (loop4): group descriptors corrupted! [ 225.163851][T12890] EXT4-fs (loop0): group descriptors corrupted! [ 225.168432][T12892] EXT4-fs (loop2): unsupported descriptor size 0 02:10:30 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xb) [ 225.185300][T12901] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 225.198284][T12901] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 225.213468][T12901] EXT4-fs (loop1): mount failed 02:10:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 225.291182][T12897] EXT4-fs (loop5): couldn't mount as ext3 due to feature incompatibilities 02:10:30 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000fc0)=0x7fff) r2 = dup3(r1, r0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x28, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x87}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040051}, 0x40000) sendmsg$netlink(r3, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)={0x18c, 0x18, 0x1, 0x0, 0x0, "", [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="f800055263bafcd380b69bc384f95d8d126c328bd06df3710943c071f91367ad876b3c41f5b381d855b007812874be9add047722998096a3932819689ddee40333344e5656b1b7c00d2b72d16a5e548e165c2041705c201e0068a9d68186161bf28f395a65d38a638d6daa798680f2269a10bf51827b970322d3706d3bc9f6f3fb04603ac47469377f97c25157c5242f80f719f58509c9ec2d069220c41e8f8d5a9020b1105253ee54105fbb47a47faff658381144b0ab0791844e17ff5e9ca0cf8e3dae4e8a2383bce59cb6b2872822739ab6c110fb5d8b9b2933fdadc28647a1c2b9221703c1618ccc88c8c3515622afb7", @typed={0x4}, @typed={0x8, 0x78, 0x0, 0x0, @fd=r4}]}, @nested={0x6d, 0x0, 0x0, 0x1, [@generic="5980cd5cb0673668ece4ccf011eb10bf7a2b02ddbcdae6f04f10b35eda5172ec14fcfdfef57f040edf0d3c8ae9a816a18b87477478ea8ee2876fdfd99dc0fb7b6efee8b92c0315ab3ada9b07b1434e634044c50629e4f1fe0d32e55d292bf683e0f56700642656479a"]}]}, 0x18c}], 0x1}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f00000002c0)={'gretap0\x00', 0x0, 0x1, 0x8000, 0xbd, 0x6, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x68, 0x0, 0x2, 0x0, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, {[@generic={0x94, 0x10, "26dec1ce1c827ca34539a1b6c923"}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x14, 0x15, 0x0, 0xc, [0x1, 0x2d, 0x8, 0x7ff]}]}}}}}) preadv2(r2, &(0x7f0000000f00)=[{&(0x7f0000000800)=""/70, 0x46}, {&(0x7f0000000880)=""/84, 0x54}, {&(0x7f0000000900)=""/35, 0x23}, {&(0x7f0000000940)=""/232, 0xe8}, {&(0x7f0000000a40)=""/230, 0xe6}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/160, 0xa0}, {&(0x7f0000000d00)=""/242, 0xf2}, {&(0x7f0000000e00)=""/246, 0xf6}], 0x9, 0xc6, 0x7, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@private0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) [ 225.389608][T12917] EXT4-fs (loop2): unsupported descriptor size 0 [ 225.396349][T12916] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 225.408363][T12916] EXT4-fs (loop0): group descriptors corrupted! [ 225.410089][T12919] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 225.425316][T12919] EXT4-fs (loop4): group descriptors corrupted! 02:10:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 225.425985][T12921] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 225.451166][T12921] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 225.469886][T12921] EXT4-fs (loop1): mount failed 02:10:30 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xc) [ 225.597971][T12940] EXT4-fs (loop2): unsupported descriptor size 0 [ 225.652484][T12944] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 225.666199][T12947] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 225.678221][T12935] EXT4-fs (loop5): Unrecognized mount option "syztnl1" or missing value [ 225.682120][T12948] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 02:10:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 5: fstat(0xffffffffffffffff, &(0x7f00000002c0)) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0xfc, 0x80, 0x7a, 0x0, 0x81, 0x8209, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xc54, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x2, 0x0, 0x4, 0x1, 0x80000000000000, 0x1, 0x4, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x2) ftruncate(r2, 0x9) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) [ 225.689685][T12944] EXT4-fs (loop4): group descriptors corrupted! [ 225.700798][T12947] EXT4-fs (loop0): group descriptors corrupted! [ 225.709200][T12948] EXT4-fs (loop1): mount failed [ 225.736337][T12935] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 02:10:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:30 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xd) 02:10:30 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 225.877436][T12963] EXT4-fs (loop2): unsupported descriptor size 0 [ 226.025363][T12980] EXT4-fs (loop2): unsupported descriptor size 0 [ 226.036781][T12984] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 226.043204][T12977] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 226.058832][T12977] EXT4-fs (loop4): group descriptors corrupted! 02:10:31 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x0, 0xfffffff8, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x40, 0x6, 0x8}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x50, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x50, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x50}}, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r11, 0x0) connect(r11, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) sendmsg$nl_route_sched(r2, &(0x7f0000001d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001d40)={&(0x7f00000003c0)=@newtaction={0x1968, 0x30, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{0x414, 0x1, [@m_ctinfo={0x110, 0x1b, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x7}]}, {0xdb, 0x6, "ffe684faff345746488e1ad91d54ec670163ab1f5862bab7cf1a65a1669d2d554cccccc6b80d0a5372db9136b5ee30cbe569f9aa37c29f7567bd8f7c75e34e23b45da34215bbd662d76d9d4d8fb51f84e32d4e71c6fb7631ce911d44ed2e2368a472138359d41dd11a110e61e970f95511104fcfff5bc09de0e780dd131b26f9cd7e47235057cc33b3956fe89f8729fbdeecd387badfea33ac635fb8a06a07f58fcb21e2b73bf913d166889cd0dc6e96fe39540df6715d0b6e4e3705a2a142726533007233f2c2dc5e6d32a7ed868fad59bd2010761962"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_bpf={0x114, 0x1a, 0x0, 0x0, {{0x8}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x3}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{0x1ff, 0x6, 0xdb, 0x58f3}, {0xf418, 0xad, 0x0, 0xffff0000}]}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x9}, @TCA_ACT_BPF_FD={0x8, 0x5, r3}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x3}]}, {0xb6, 0x6, "acfe66bd9b3f8212a6df8ca038b09a14635ab3d61dfeca3d27eb3b50a3948eb1e4f9077a0f873e8a75945cfedc8ac053f0cfe23bd4bdc82e174a027104fb92aa98eb788f1620b3b66839c87105ced814a0bf3baca14ec6a04a806cdb24769e3d989a39d0b9b3bb63f2a85b533793d1397b85fe1d370d3a9549731cc7f72cf799a68d3a0aa27c414adf8e18e851d3013bc896a7ec4119599510ee3eccfa8c0ca5c6fc6cf95b2da11d7b7809fb79ba887702ed"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_mirred={0xd8, 0x3, 0x0, 0x0, {{0xb}, {0xa4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0x1, 0x0, 0x0, 0xfffffffc}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x2, 0x8, 0x372, 0xa11}, 0x3, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x312, 0x0, 0x6, 0x4}, 0x1, r7}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x95bd, 0x80000001, 0x4, 0xff, 0x80}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0x1ff, 0x6, 0x8, 0xe0000000}, 0x3, r10}}]}, {0xa, 0x6, "13bfbe6e2292"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_gact={0x90, 0x16, 0x0, 0x0, {{0x9}, {0x4c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x6, 0x3, 0x3, 0x3, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x21f6, 0x20000000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0xfdb, 0x20000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0xd8, 0x8, 0xfffffffd, 0xdd1}}]}, {0x1c, 0x6, "527e77641646b01be094649dd9d5c125be28814b1d43cabe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_xt={0x84, 0x5, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x6}]}, {0x53, 0x6, "75e51a7692798847becb9a4043adb4f44fa36f44404ce240a2d114a0b7080abb000542cb71c64bc54f7015cb8023a100ba81982e1436a5db1be6f6fbf625f608ec14ee933596231afdba6dc58302dc"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}, {0x478, 0x1, [@m_ct={0x78, 0x6, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e21}]}, {0x48, 0x6, "60281b10d40fb767f15a85c565ec344932736c0f5ade5066c005914460a8a28e99bfc87680df064adadf937b41cf3f0631efc79321c81a5a657e0fe1d8071ea5c1823cec"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_sample={0xac, 0x15, 0x0, 0x0, {{0xb}, {0x6c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x3ff}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x4f}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x4}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x20, 0x823, 0x4, 0x4}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x9, 0x8, 0x20000000, 0x4, 0x8}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x7ff, 0x3b821e0c, 0x2, 0xd1a, 0x8}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x2}]}, {0x18, 0x6, "6164451193d5cb944b02e6509e803a84e773f3d9"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_bpf={0x1bc, 0x1b, 0x0, 0x0, {{0x8}, {0xd4, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS={0x44, 0x4, [{0x1, 0x3, 0x0, 0x3}, {0x80, 0x4, 0x81}, {0x9, 0x7, 0x6, 0x68}, {0x5, 0x4, 0x1, 0x8}, {0x400, 0xb1, 0xa5}, {0x3f, 0x2, 0xc1, 0x1000}, {0x1, 0x20, 0x0, 0x1}, {0x35, 0x9, 0x40, 0x2}]}, @TCA_ACT_BPF_FD={0x8, 0x5, r11}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{0x3f, 0xff, 0xfc, 0x7ff}, {0xfff, 0x40, 0x9, 0x4}, {0x0, 0xfb, 0x3, 0x7}, {0x2, 0x9, 0x0, 0x2}, {0x8, 0x3f, 0xb4, 0xd5}, {0x0, 0x1, 0x6, 0xf5d2}, {0x2, 0x40, 0x80, 0x40000000}]}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x6}, @TCA_ACT_BPF_OPS={0x1c, 0x4, [{0x9, 0x1, 0x3, 0x20}, {0x20, 0x0, 0x0, 0x4}, {0xc9a, 0x4, 0x9, 0x4}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x9, 0xfffffffa, 0x7, 0x2, 0x8}}]}, {0xc1, 0x6, "795826c2fc0f1024852daf8879ba365ed3ff081c186b47d36e3c68309069adc35b25d356d48d13b1b7bb102048af76642bbd3c4615209f6a5445828c39fb07bf5911c0202715f9b3174889b82370676d3cb527767c6c3c35536548adae19b3aef7f7128d41947656e19757c5161d3e98f015f75a0e16eebc385c031cd20848c84af94e918b74e482e891f84fce53aab212f22aa3253a4b2b8e15229193e2bf06eb7305d7dd3d222f91a1e4a39dc5562e7ef314fbed2f9548b00085a176"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_xt={0x194, 0x18, 0x0, 0x0, {{0x7}, {0x134, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_TARG={0xb9, 0x6, {0x40, 'nat\x00', 0x5, 0x7ff, "651166c63a5079a98baa0ddfa0d543a1ff75cb1f4706b188f70a65f627c22c0c70b988e339417a0eb4a7037f6c76bd793d9ce19522b6ab488762d2c284b8908ae2fcaa26c7e511c4e46970ed55e1c854dff1005be3564ba3aa41287fdd84ecba75f6a3803dfa8f7e8bfeef1a185acff55ed0f65ef8e3086f9af265a0840afa55d902c4c708e621e699b5d2f07aa974"}}, @TCA_IPT_TARG={0x3f, 0x6, {0x1, 'mangle\x00', 0x1, 0x5, "ac4a7de73c8d393b186ecfd2324696d746ad5805c0"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x6}]}, {0x3c, 0x6, "0a6c558231b9291eec1d7923834352ec96ca72f9ce6d2583f5fd082f1b030063ad707959f1c9a04b699aa7f828ef8bb8b1f6a19d47bc2fbf"}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}, {0x4cc, 0x1, [@m_sample={0x44, 0x20, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x8001}]}, {0xd, 0x6, "e209bfa636d80996f2"}, {0xc}, {0xc, 0x8, {0x3, 0x3}}}}, @m_sample={0x54, 0x3, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x200}]}, {0x1d, 0x6, "f35cf428a0f6622d5673981373c2c5985da3eddef33d1e2590"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_tunnel_key={0x170, 0x12, 0x0, 0x0, {{0xf}, {0x8c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @broadcast}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e21}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @rand_addr=0x64010102}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x8}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x12b6d7c9}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x4, 0xaaa4, 0x6, 0x200000, 0x2}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @empty}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x1, 0x0, 0x20000000, 0x1ff, 0x5}, 0x2}}]}, {0xb7, 0x6, "20c345099a7b1498b801682b86b9895f60ee3c1a8aae8808fc98943039c32ae0d4bf87df03572c16ac5011c1ead1eec77fa29e10c3d82936f5a31a4f404a7343a1a455d5501c002d37bb3bdee0e86e72c91d15ab19895b04c9f353ed2a37cbb65ceb613fe923723d70b1f4a8112e3e62d2ce21d73d6240bb06848f98764359fca7e184c8e3b3d4c078068e885f31d0339a87e3725f8d72c149998badeabd622fb3656a7835425a45c891a1206da7f0a25d2f4a"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_connmark={0xec, 0xc, 0x0, 0x0, {{0xd}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7, 0x1, 0x5, 0x423, 0x3}, 0x4}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x800, 0xe, 0x917f, 0x400}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x4, 0x8, 0x7, 0xfff}, 0x172c}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5e6, 0x10000, 0x20000007, 0x7fff, 0x236}, 0xc4ef}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0x40, 0x10000000, 0x1f0d2db6, 0x40000000}, 0x6}}]}, {0x30, 0x6, "53c983f11dd90975a999e93ce9df08f144f203b226bd26c85cc1946da3c8671e202914a93358b2616cc7c6d3"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_ipt={0x1d4, 0x8, 0x0, 0x0, {{0x8}, {0x1ac, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x5}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x2}, @TCA_IPT_TARG={0x121, 0x6, {0x0, 'mangle\x00', 0x1, 0x800, "bd769e079caea950428509afa74570c6b9872647a47c58d7a9e507538f1f95f069beb189d2731d4a76ab8d6d7691f4a4e880c6fbfeb044ef4b94442296a259e7f2596e58078b9a16b4ccbeb273da48192f06fff061556e96ef4921ce3459db607ed3a539dc84ad5494b48964d5c5380c6dd5a19c5a72c28970c4f5173ce8dc468e92b2a6645a49ba6a52ab177a4bb2d6121c3065f2e1c3aa57f537d7c79f7049a3e80dc77ef3d0b8eff427f8a30bac5ecb49fa305f19a2842dc72f061feaa7535793a8cb4540bac6013381cce954f1e0a333cd464ad28fd8f48b8101f4ef392cbd633311a13a4b1ff3928acf42a587054a992700c2844d"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x9}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}]}, {0x544, 0x1, [@m_csum={0xf0, 0x1c, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xfffffffe, 0x0, 0x1, 0x9, 0x80}, 0x4d}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x7972, 0x4, 0x1, 0xffffffff, 0x1}, 0x4f}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3ff, 0xbb4c, 0xffffffffffffffff, 0x40, 0x7}, 0x68}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x8001, 0x4, 0x20000000, 0x3, 0x3ff}, 0x70}}]}, {0x52, 0x6, "b66460ea6f6bacf14535d3a7e5f303719beb9988f925ca5c0e5956d10d6669549cb7e6b96663e11a8d5ea0ed867f59ad2566e71af5413a60e4b3216d6980d9eff478dc16b1b9773c4d2f8883492c"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_csum={0x228, 0x14, 0x0, 0x0, {{0x9}, {0x100, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x7fffffff, 0x8001, 0x1, 0x1, 0x4}, 0x3f}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x7, 0xffffff7f, 0x8}, 0x21}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0x9, 0x6, 0x0, 0x1000}, 0x61}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x80, 0x6, 0x20000000, 0x8, 0xaf4}, 0x70}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x7ff, 0x10000000, 0x7ff, 0x401}, 0x76}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x100, 0x80000000, 0x5, 0xfff, 0x7}, 0x53}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x401, 0x20000001, 0x7fffffff}, 0x75}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x7, 0x1, 0x1, 0x8}, 0x37}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x8000, 0x7, 0x7, 0x6, 0x1}, 0x50}}]}, {0xfd, 0x6, "76052ce371b0df0115bd14700f477abe5ec93e67aa416c351b29ee8a51289a2bb74605a00cb4387e671fe5cf8b442d85b8c46c6025dc8499c3ca6639eb4b257e5ad4d4c499c77b18c929fea7c8bdb03de68cf9d25f530313127870fcc1d99db77335fbf814131d43986c8ecae3dc9306da84a652ebbd8d84a7ce971f70438ea9437306c7d6a4a7e16ef70887199cd3655f38f00347dbd17680606678a68f44dbd017cc8fddfe76f816e11bc88f8c539df0974749cc059a6c8b25f1f100255cc40d5eb89104b2c16de62d304243a136a2cfc0e211d927aea4d27837698e2a4a58fd4e9e6f19bac40122ba5c0893136dc41f9bcbe3dc11639f50"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_nat={0xc4, 0x1c, 0x0, 0x0, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x80000001, 0x10001, 0x20000000, 0x8000, 0x948}, @broadcast, @empty, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xae, 0x8001, 0x1, 0x43, 0x1000}, @private=0xa010101, @local, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x0, 0x5, 0x6, 0x4}, @remote, @multicast1, 0xffffffff}}]}, {0x23, 0x6, "1f93218d4d5d84b1b73bca0e0670f744eb3fbf4d1af4df39b2d21a904a6ade"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_csum={0x164, 0x10, 0x0, 0x0, {{0x9}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xffffffff, 0x7ff, 0xffffffffffffffff, 0x400, 0x80000000}, 0x41}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0x10000, 0x10000000, 0x5, 0x2}, 0x63}}]}, {0xfd, 0x6, "665cea98564e410624ef5e6e754bd4995bec8438bc0fa0bc76bc60f0e3dd296b332926e4c1bbf04bb5f51d9192a063214bc5387bd1fcfef18d63ccecdc81abc14b066f2cdadab13b0290f677f620310cba12e6e0466cf126c147b45ebfc41f6398accacc10a0033debc7e313f42e30954690ddac17c85ce47df5f545e50e810c38cee892212e45227cf8d686377ac93a6d25a47d4bd96138613fdbda4aae9e6d56654ba6a5869cc8492d846a9921f66fbf30657cc88f26880d5bb8d0dad0adf88a8cf9e6b06e8edfd7ac848ef6cb3485084e5e66b6791160320708327a167203870f5e0c14925565d3055eaa981733e571885717a03156bc44"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}, {0x6b8, 0x1, [@m_sample={0x13c, 0xf, 0x0, 0x0, {{0xb}, {0x34, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x7fff, 0x3, 0x1, 0x80000000}}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x74e, 0x0, 0x6, 0xfffffbff, 0x1f}}]}, {0xde, 0x6, "4125573cd644ee1f9d75866d164fd3cbb3a91ad0f13ec816e1a21cd46644531c1bd295efb5e98ff91a5e890c5b43b1102b4a627ccc4a59fef6019ee61423472cc4b24f35230531533e53a881cfc91bd81689159a8edec3860a15edab3ac49683dee040a43c76ccb934cb636e198a7e9e1e4036124eb424b7678862aaacc877e6b91bddf951b7bccec8c113f35de9018f09bf8c974553e55b18374db14fb9d38a55b92aded4a37d7a8c6d32bd627dcdb18152177e05e34bbebfa9c1eb3570c344c603b6f8525af885149f04d56116871278a1484bbd1802e79ad7"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_nat={0x21c, 0x10, 0x0, 0x0, {{0x8}, {0x11c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x9f6, 0x1, 0x8001, 0x1000}, @private=0xa010101, @rand_addr=0x64010102, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xc53441d, 0x4, 0xffffffffffffffff, 0x7, 0xa}, @local, @rand_addr=0x64010100, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x3ff, 0x0, 0x5, 0x6, 0x7fffffff}, @remote, @dev={0xac, 0x14, 0x14, 0x11}}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x1, 0x4, 0xfffffffffffffff1, 0x4, 0x7}, @remote, @rand_addr=0x64010101, 0xffffffff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x400, 0x6, 0x1, 0x0, 0x7}, @dev={0xac, 0x14, 0x14, 0xb}, @empty, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0x7, 0x20000000, 0x7, 0x91}, @loopback, @loopback, 0xff000000, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x36b7262a, 0xfffff05a, 0x20000000, 0x6, 0x7}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff}}]}, {0xd9, 0x6, "e732b36774e48dac3890f09cb5fde659273cba6a24c59abd2a8b31dac3d9e9fb1fa38b688e9ba7ee2b3786bff94c896794e8852a05b3c727d4f21bb18a997bb5bd69255c59383357f5c37e2fce2c5d62c1db4fcadfb643cc0eb97147da66a1e431f23b3c623bbd169c91fee57b06728fb4bd8e42de1b03dcb1f1c8cac76b547eca16f11b08102a56584ffb62f695246fc109461632e7a29f0d8e52fee5f990a53db6c3e0a2dc71d0e92b1a9def4799478efa4217317d0f50758203c3b80714dfa1e9a16694e5b7317a6380797a87915d4481115b2e"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_mpls={0x50, 0x9, 0x0, 0x0, {{0x9}, {0x24, 0x2, 0x0, 0x1, [@TCA_MPLS_PROTO={0x6, 0x4, 0x800}, @TCA_MPLS_TC={0x5}, @TCA_MPLS_TTL={0x5, 0x7, 0x1f}, @TCA_MPLS_PROTO={0x6, 0x4, 0x1}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_xt={0x170, 0x1d, 0x0, 0x0, {{0x7}, {0x88, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x7ff}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}]}, {0xc4, 0x6, "5c13ccfb6cff2f822970c2b8a177b43d316bef7971af56245fd5bfe4d485544339ee521c7f89245086469b094bb45b80a0ad2c0162688cf6edfb9998e20ea7c8b911c888321391e212afb211b25ef34d624615b9d63bf433b3e481e63f63937796c2b86deb35d22f08fd8d4972ed969440a2544ed68009d21cbb796bfe3a1e899ae8205420060a422d65ec6d78f840a77a8a5e8ded734a899507e3ca55bcb8ac23e5ee7c1ef37e764f6e44171f781c315772dfbf304e0a57e0a01876c844910c"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_police={0x48, 0x3, 0x0, 0x0, {{0xb}, {0x4, 0x2, 0x0, 0x1, [[]]}, {0x1b, 0x6, "861eb0e2c8ad84886744f685f02b3f2a5e2edb7f4c0826"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_xt={0x154, 0x9, 0x0, 0x0, {{0x7}, {0xcc, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TARG={0x76, 0x6, {0x8, 'filter\x00', 0x58, 0x5, "473fa55e14f2b71356c0f2b6298fad14850951b57a2f1446397a9c9ae7709a58f9aa682d7769aa39b0a0319c799d9f021570b1b264881c9d5c22bff4614dc18f7803149fca38cd733c8b6a78"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}]}, {0x61, 0x6, "e7f189234859dce3cc2dcb897af8af6bc45dc4693d6e6806c0b0d195142c6ab128aff5cacf1f61a9bdb508c131dfe828f5e3fe2bfbea7afac00b7195ecac4501164f86da1fa0607c87496498fc0817bff815250727c8f87dc47fdc9c7c"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}]}, 0x1968}, 0x1, 0x0, 0x0, 0x50}, 0x90) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) [ 226.073603][T12984] EXT4-fs (loop0): group descriptors corrupted! 02:10:31 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 226.115401][T12986] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 226.116270][T12983] EXT4-fs mount: 134 callbacks suppressed [ 226.116282][T12983] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 226.130983][T12986] EXT4-fs (loop1): mount failed 02:10:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xf) [ 226.266605][T12999] bridge0: port 3(veth3) entered blocking state [ 226.273062][T12999] bridge0: port 3(veth3) entered disabled state [ 226.279967][T12999] device veth3 entered promiscuous mode [ 226.291438][T12999] bridge0: port 4(veth5) entered blocking state [ 226.297907][T12999] bridge0: port 4(veth5) entered disabled state [ 226.304872][T12999] device veth5 entered promiscuous mode [ 226.345278][T13001] EXT4-fs (loop2): unsupported descriptor size 0 [ 226.356230][T12997] bridge0: port 5(veth7) entered blocking state [ 226.362583][T12997] bridge0: port 5(veth7) entered disabled state [ 226.369778][T12997] device veth7 entered promiscuous mode [ 226.378211][T12999] bridge0: port 6(veth9) entered blocking state [ 226.385332][T12999] bridge0: port 6(veth9) entered disabled state [ 226.392342][T12999] device veth9 entered promiscuous mode [ 226.396781][T13002] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 226.417774][T13008] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 226.421432][T13002] EXT4-fs (loop1): mount failed [ 226.432429][T13008] EXT4-fs (loop0): group descriptors corrupted! 02:10:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 5: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000028c0)=0x2) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=r4, @ANYBLOB="821d4f101177021e8fd7558bb803050500000000c44a4998dbf4cecbc7bc45caeaa1942f11fec7f62f3b0886c18acb83ec06f5cd508695a7c91172c61eb875ff0d43bef9175bb0f70519e0bb034fdee523476a9275af8334a326b02c3f4dfe789d29f4b0ee03262f622b3658634f8883b5e65e20fe99"], 0x20}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002880)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=@newchain={0x253c, 0x64, 0x4, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x8, 0x6}, {0x3, 0x9}, {0x7, 0x9}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x9}}, @filter_kind_options=@f_rsvp6={{0xa}, {0x4ac, 0x2, [@TCA_RSVP_ACT={0x414, 0x6, [@m_csum={0x13c, 0x1b, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x3f, 0x2c, 0x3}, 0x56}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x80, 0x5, 0x20000000, 0x7, 0x2}, 0x27}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x2204, 0x2ae, 0x6, 0x8}, 0x65}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x8, 0x1, 0xffffffffffffffff, 0x4, 0x8}, 0x43}}]}, {0x9e, 0x6, "149d5036068f5f957d922c4cbd228c5e1abd8129c3f71ab47961047b394f38804db39738be9ee76d0757b89596e31a3fdf62a41d950a2dfbf6474a90ee414b104172e7d9f45cb91c2b104d935d6ad827141b8920aba98ed42cd6e0c4a6c697d8fa283382708728500d1c3b44f2f62d9f3959417606b0b35ea1843dfcd80ec1ba879b0e74c6b425e477da1e68ba401c9897312561b2afa66bef52"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_ife={0x108, 0x1c, 0x0, 0x0, {{0x8}, {0x44, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x7, 0x5, 0x8, 0x9, 0x1}}}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x7, 0x1000, 0x5, 0x9, 0x1ff}}}, @TCA_IFE_TYPE={0x6}]}, {0xa0, 0x6, "b2dbccb8d22204e8530e8e2db9599e64b36aa5bc0d2a63fbdc9b70839229de37b7f8a0452793d9e37d075fe561255683cd9a286d281f330958e1da1614b9d65827e3b17f141e3eab43ab73c7b2dfd81babbf00873891f9efa72f5f5eb55fbb03d35e8d90d6fa73afaa67dc7fce5b2de055bc592b9b1bbd851df55e552ee1d2e38681f4af3d26d96a8af44a67e2b1c1f713f6b769aecd1ecedc4f0961"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_csum={0xa8, 0x6, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x81, 0x6, 0x20000000, 0x7ff}, 0x1c}}]}, {0x5e, 0x6, "c908108d9d2e33adc5c4c6bbff621df70c74ac4437898f3ccb352f0a25d362a5fe9c727344d734a454d8bfae7ba9a43f9586bcac6e63cf7ad2bd5f846d0f14546204d74c988bc2a77734b30eee44f6a3e8b01a574bfa873af18b"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x124, 0x7, 0x0, 0x0, {{0xc}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0x9, 0x8, 0x0, 0x438bc086}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x5}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x2, 0x9}}]}, {0xcd, 0x6, "87a85eb764092372e40cce751458d49c094ea503d9763ea15d097fc5cec52cbfab706487bab47674e67a85b97d9d0d741b7d1518118b198f699ab33cd59af2212721f60209fe7f0e0f9f87a2cc624eb7288e88bb29dda6e43a043d6a96614020cf7e5d2f84b519f78b999213b595e487e6827e14a855516931888aa6e26a90defc031ea227791142fed4f9fe92162ccaad55e0b6a0817f8808374671704d7dd262617165e5122a5bee24bc7dbe00d1a9226a4d84999a7afd630e05744cf7044857936ae90dfbefa975"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_RSVP_DST={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x6, 0x6, 0x80}, {0x5, 0x80200, 0x5}, 0xff, 0x9, 0x82}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x6, 0x1, 0x3}, {0xfffff8ea, 0x10001, 0x7fffffff}, 0x29, 0x8, 0x2}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x1, 0xffffff00, 0x1}, {0x3, 0x400, 0x4}, 0x67, 0xf2, 0x7}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x80, 0xcea8, 0x10001}, {0x40, 0x2, 0xa00b}, 0xc, 0x8, 0x1f}}]}}, @filter_kind_options=@f_basic={{0xa}, {0x1828, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0xe, 0xf}}, @TCA_BASIC_POLICE={0x440, 0x4, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8000}, @TCA_POLICE_RATE64={0xc, 0x8, 0x80}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x5, 0xda1, 0x5, 0x8001, 0x9, 0x4, 0x8, 0xec45, 0x3ff, 0x10000, 0xfffffffd, 0x3, 0x0, 0x3, 0x8, 0x5, 0x3, 0x800, 0x9d9, 0x0, 0x2, 0x56, 0x6, 0x0, 0x1, 0x2, 0xffffffff, 0x80000000, 0x9, 0x40, 0xffff, 0x8, 0x4, 0x7cc, 0x7, 0x3, 0x7ff, 0x8, 0x2, 0x3, 0x3, 0x1f, 0x3, 0x10000, 0xc0, 0x7, 0x0, 0x800, 0x2, 0x1ff, 0x0, 0x2d8, 0x6, 0x101, 0x20000000, 0xfb44, 0x7, 0x7, 0xfff, 0x3, 0x3, 0x1, 0xb864, 0xffffff00, 0x7fff, 0x4, 0x101, 0x1c0, 0x8, 0x8, 0x5, 0x2, 0x8, 0x6a7d, 0x6, 0x161de00, 0x401, 0xf656, 0x4, 0x6f8a763e, 0x3, 0x1, 0x5, 0xb334, 0x0, 0x101, 0x1, 0x3, 0xffffff01, 0x8001, 0xff, 0x8, 0x1, 0x80000001, 0x711, 0x2, 0x3ff, 0x81, 0x8631, 0x101, 0x80000000, 0x3ff, 0x1ff, 0x2, 0x7, 0x2, 0xe, 0x4, 0x401, 0x7, 0xfff, 0x7, 0x2, 0x9, 0x6, 0x3, 0x40, 0x7e, 0x4, 0x6, 0x2, 0x1f, 0x80, 0x8000, 0xc061, 0xffffffff, 0x0, 0xffff, 0x401, 0x1, 0x7ff, 0x6, 0x6, 0x1000, 0x14cd, 0x100, 0x1c, 0x6, 0x9, 0x1, 0xffff, 0x5b0, 0x0, 0x101, 0x5, 0x0, 0x0, 0x4, 0x1f, 0x7, 0x3, 0x8, 0x101, 0x4, 0x7fff, 0x10000, 0x5, 0x0, 0xdb5b, 0x1, 0x3, 0x4, 0x7, 0x2, 0x1000, 0x80000001, 0x1, 0x7f, 0x0, 0x7fff, 0x9, 0x101, 0x8, 0x3, 0x49b, 0x3, 0x401, 0x6, 0xffffff00, 0x0, 0x200, 0x5, 0x5, 0x72c1, 0x401, 0x8001, 0x401, 0x200, 0x9, 0xda48, 0x3, 0x6, 0xfffeffff, 0x4, 0x4, 0x67, 0x80000001, 0x0, 0x400, 0xfffffffa, 0x8, 0xa7b, 0x9, 0x1, 0x8001, 0x6, 0xfffffffd, 0x1000, 0x7, 0x4, 0x10000, 0xfffffffd, 0x8, 0x80000000, 0x0, 0x4, 0x9, 0x9, 0x6, 0x8001, 0x1, 0xed92, 0x5, 0x3, 0x0, 0x5b, 0x200, 0xffffffff, 0x6, 0xfd24, 0x1, 0x9, 0x7f, 0x1, 0x8, 0x20, 0x2, 0x6, 0x7, 0x1000, 0x0, 0x80, 0x2, 0x4, 0x7f43ee26, 0x400, 0x6, 0x7, 0x8, 0xfffffffd, 0x4, 0x3, 0x1, 0xdb, 0xa22]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x3}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_RATE64={0xc, 0x8, 0x4}]}, @TCA_BASIC_ACT={0x13dc, 0x3, [@m_mirred={0xb0, 0x1a, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x4, 0x133, 0x10000002, 0x7, 0x5}, 0x4, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xffffffad, 0x6, 0x1, 0x10001, 0x8}, 0x1}}]}, {0x41, 0x6, "0177ddd97ad76616f1a35288192375afbfe651ab7ed7c2eeb4284a08f172c2bf9c799f26d0b04f0d98801b8b656b07d64b77e82ab1299da2aa1114a171"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_bpf={0x124, 0x16, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2, 0x8, 0x5, 0xe4b2, 0x4}}]}, {0xe3, 0x6, "25a4adb623b43e1d115efd59113d6c8d3fe0d060d3657391abee6ad684395c0fe9383bcd6da5f32266f8f11e07cee55e96654a3385905e1299f666c5320b8be01f1731d2c094c88df22576f7edf828b0ce8b8051d9ef5a292dd5f5feb7ccff0f0da9ec971d2c5477a78896f01c467ff70f901adfef24916a872d835f9230ccea09e5319e0797cf58cc5d2a9849e2ec0d181cd9b9f4546b8fd7d6d12efa8c031fe83782b8e53e4d876e7b9354d103da6712c626831557af09c5aa7df7e56fdc2c2dc5fef9525c20052166479cc92ac94b79769adea36be5b9ab860b1ff7a597"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_police={0x14c, 0xb, 0x0, 0x0, {{0xb}, {0xb8, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1a8f}, @TCA_POLICE_RESULT={0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8}], [@TCA_POLICE_RESULT={0x8, 0x5, 0x3}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1ff}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7f}, @TCA_POLICE_TBF={0x3c, 0x1, {0xfffffff9, 0x2000000a, 0x7fff, 0x81, 0x1000, {0x7, 0x2, 0x7, 0x401, 0x6, 0xfffffe01}, {0x9, 0x2, 0xe2, 0x4, 0x4e2c, 0x1f}, 0x8, 0x835, 0x81}}], [@TCA_POLICE_RESULT={0x8, 0x5, 0x101}, @TCA_POLICE_TBF={0x3c, 0x1, {0x1, 0x7, 0x80000001, 0x3, 0x3, {0x7f, 0x25e6786a61c0e1ea, 0x1000, 0x7, 0x9, 0x67}, {0x81, 0x1, 0xa05e, 0x2, 0xfff, 0x8}, 0x7fffffff, 0x6, 0x7}}]]}, {0x6a, 0x6, "f5281cb2030bfca06a6fbee78296a383a1946e3eea993d2a211629b433446c57dc58ca2e50332178b96fc7b8d7c48d8d2706c7035cf6797966dc9c07d9f57b54c5d36d0e6cbb38e649a2db83076d3765e9a238b652cc3deecdbc6beed53eef25056b23dcb0c1"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ipt={0x10b8, 0x12, 0x0, 0x0, {{0x8}, {0x90, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TARG={0x60, 0x6, {0xa121, 'filter\x00', 0x5, 0x6, "c06d1e7f42852dc7fcd2b1426b0c24f3d59099804aa7d31aa4954787c04b70c71b9d5c327d5b389ef04c5ad7159dc576ca42c0436706"}}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0xa2, 0xae}}, @filter_kind_options=@f_tcindex={{0xc}, {0x810, 0x2, [@TCA_TCINDEX_POLICE={0x80c, 0x6, [@TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x1, 0x81, 0x8, 0x401, 0x7, 0x800, 0x6, 0x7, 0x0, 0xbb, 0x80000001, 0x6, 0xa66, 0x3, 0x8, 0x7, 0x2, 0x89, 0xffff13b9, 0x80, 0x700, 0x0, 0x3, 0xfff, 0xfff, 0x5, 0x2, 0x800, 0x9, 0x11, 0x64a7, 0x9, 0x0, 0x3f, 0x0, 0x3, 0x3, 0xffff7255, 0x1e25, 0x8, 0x7, 0x4, 0x8001, 0x3, 0x3, 0x0, 0x4e, 0x5, 0x3ff, 0xffff, 0xbf6, 0x5, 0x94c, 0x8, 0x4, 0x2, 0x800, 0x18000, 0x8, 0x6, 0x61a2, 0x7, 0xffff, 0x100, 0x100, 0x79a, 0x4, 0xffffffff, 0x80, 0x5, 0x3bd, 0xfffffdc0, 0xffffff16, 0x0, 0x7, 0x1, 0x2, 0x2, 0x2, 0x4, 0x9, 0x1, 0xffff, 0x7fff, 0x3ff, 0x6, 0x0, 0x10000, 0x1, 0x8, 0x7, 0x3, 0x4, 0x9, 0x17, 0xc46, 0x4, 0x632, 0x8, 0x101, 0x7ff, 0x40, 0x1, 0x2, 0x0, 0x8, 0xfffffffe, 0x1000, 0x401, 0x3ff, 0x7, 0x0, 0x40, 0xfffffffb, 0x10001, 0x7, 0x9, 0x3, 0x7f, 0x7f, 0x81, 0x1, 0x0, 0x7fffffff, 0x0, 0x8, 0x1, 0x1, 0x68859d09, 0xde2c, 0x4, 0x1e, 0x5, 0xfffff00f, 0x1f, 0x8, 0x0, 0x983, 0x9, 0x80000000, 0x6, 0xed7, 0x200, 0xff, 0x0, 0xa9, 0x7, 0x7, 0x3, 0x8a7, 0x7, 0x2, 0x1ff, 0x0, 0x10000, 0x5, 0x26eb3418, 0x9, 0x5, 0x7fffffff, 0x20, 0x9, 0x1, 0x7, 0x6, 0x3, 0x2, 0xffffffff, 0x4, 0x8, 0x8, 0xd54, 0xa80, 0x8, 0xffff, 0x6, 0x71, 0x47ec, 0x6, 0x9, 0x100, 0x10000, 0x0, 0x6, 0x3, 0x1, 0xf1f, 0x2, 0xffffffff, 0xd7ff, 0x3f, 0x0, 0xfff, 0x7fffffff, 0x9e, 0x8, 0xfffffffb, 0x2, 0x81, 0x8001, 0x3, 0x0, 0xff, 0xfffffffb, 0x5, 0x5, 0x7, 0x5, 0x3, 0x7ff, 0x7ff, 0x9, 0x8, 0xc000000, 0x1, 0x401, 0x4, 0x5, 0x7, 0xfffff7f3, 0x1, 0x4, 0x0, 0xb40d, 0x6, 0x6, 0x5, 0x444d4f87, 0x7fff, 0x7, 0x200, 0x7, 0x40000000, 0xffffffff, 0xe0000000, 0x3ff, 0x395, 0x1000, 0xfff, 0x7, 0x7, 0x0, 0x4, 0x1, 0xfffffffd, 0x9, 0x53d925fd, 0x66, 0xffffff80, 0x6, 0xf3a, 0x8220, 0x7fffffff, 0xb1a0, 0x7fffffff]}, @TCA_POLICE_RATE={0x404, 0x2, [0xcf5, 0x1, 0x0, 0x1, 0x7, 0x7, 0x80, 0xff, 0x7, 0x6, 0x0, 0x9, 0x3, 0x7, 0x1, 0x9, 0xffff79b1, 0xa59, 0x7, 0x6, 0x6, 0x1, 0x81, 0x7, 0x101, 0x8, 0xfff, 0xfffffffe, 0x7fff, 0x3ff, 0x122b, 0x71e7, 0x9, 0x8, 0x6, 0x0, 0x8, 0x1, 0x589, 0xfffffff7, 0x80000001, 0x658, 0x4, 0x3, 0x8, 0xffffffff, 0x9, 0x1, 0x1, 0x0, 0x625, 0x1000, 0xd6, 0x8, 0x3, 0x6, 0x2, 0x101, 0x0, 0x6, 0xd6, 0x43, 0xfffff31a, 0x6, 0x7ff, 0xffff, 0x135, 0x3, 0x1, 0x1, 0x9, 0xffff5234, 0x0, 0x7ff, 0x1, 0x0, 0xcd2, 0x1, 0x7, 0x2, 0x7fff, 0x3, 0x8, 0x4e, 0x4d28, 0x5, 0x4, 0xfffffffc, 0x6, 0x7, 0xb59, 0xffffffca, 0x6, 0xffff, 0x9, 0x40, 0x80, 0x9, 0x1, 0x1, 0x7fff, 0xfff, 0x1000, 0x6, 0x20, 0x8, 0x2, 0x54c4, 0x3, 0x101, 0x8, 0xff, 0x64, 0x342, 0xd5f9, 0x8, 0x7fffffff, 0xdbe, 0x5, 0x200, 0x7, 0x0, 0x7ff, 0x3a, 0x1, 0x6, 0x2, 0x8000, 0x362, 0x0, 0x1, 0xfffffdcd, 0x7, 0x1, 0xfff, 0x1, 0xce5, 0x6, 0x100, 0xfffffffb, 0x5, 0x9d, 0xbc, 0x1, 0x80000000, 0x80000000, 0x9, 0x2, 0x2, 0x7fff, 0x1f, 0x81, 0x9, 0xfffffffa, 0x8000, 0xad, 0x28000000, 0x5, 0x8, 0x3, 0x7, 0x8001, 0xc9d, 0x1, 0x5, 0x4e, 0x3, 0x100, 0x7, 0x3, 0xfffffffc, 0x8, 0x1000, 0x1bb7, 0x8, 0x4, 0x3, 0xfffffffe, 0x4, 0x40, 0x7, 0x4, 0x8, 0x8, 0x9, 0x6, 0x6, 0x9, 0x2f, 0x7, 0x7fff, 0x8, 0x1, 0x1f, 0x2, 0x6, 0x6, 0x4ce6, 0x20, 0x77ef1216, 0x7fff, 0x1, 0x80, 0xfffffffb, 0x1, 0x7fffffff, 0x8, 0x10000, 0x7, 0x6, 0xb606, 0xfffffffb, 0x9, 0x9, 0x101, 0x5d6, 0x7, 0x6, 0xa19, 0x400, 0x200, 0x7b6, 0x6, 0xe54, 0xd5, 0x1, 0x8, 0x7fffffff, 0x4, 0x4, 0x4, 0x1, 0x9, 0xd7, 0x9, 0x3, 0x8169, 0x8, 0x4, 0x5728, 0x3ff, 0x4, 0x4111, 0x9, 0x5, 0x5, 0x4, 0x1, 0x3, 0x80000000, 0x32, 0x4, 0x7, 0x5d1, 0xfa, 0x400]}]}]}}]}, 0x253c}, 0x1, 0x0, 0x0, 0x4040}, 0x4004000) fstat(r0, &(0x7f00000002c0)) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r6, r0, 0x0) [ 226.453702][T13010] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 226.482514][T13010] EXT4-fs (loop4): group descriptors corrupted! 02:10:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 226.586121][T13031] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.593541][T13031] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.602030][T13031] device bridge0 entered promiscuous mode [ 226.610335][T13025] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 226.626842][T13019] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:10:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x10) 02:10:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 226.645988][T13025] EXT4-fs (loop0): group descriptors corrupted! [ 226.655474][T13030] EXT4-fs (loop2): unsupported descriptor size 0 [ 226.664927][T13023] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:10:31 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) r2 = dup3(r1, r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) connect(r3, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) sendmmsg$sock(r2, &(0x7f0000002740)=[{{&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x4, 0x1, 0x1, 0x3, {0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0xef}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)="a90f706b476f399793d56aecaaba22e0b6a16cd0e92af7b717c9bfa63acef48bbe45a59bccbff0403069ec3fc8e537ce", 0x30}], 0x1, &(0x7f0000000340)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x81}}, @mark={{0x14, 0x1, 0x24, 0x6d47}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x90}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)="8b7294f5c66d7ce2c275fd22469737942ced79f9ab1e38f7fb3cbc620b12bb8fc4040c9e9a602f2022aa9f0062f0da011e6d01a9388a8aefe4725f241d8440e108d5ac888cd3b3eaa52f27acde5858d2eee11340d0365391d0fc2b51ac8412bbd1898c08d19dda4eb1049d639be78941c4d58139266f4a6977f8f13e762c78d6aaf83675ddde8263b3e7acae67fc6e259fcbe13ec057a74263aac2243accd17eb1", 0xa1}, {&(0x7f0000000180)="dbe6ccff165a49ebb39c1c6236b49d9cf43a2f28e095dddddccba333f880cca65d7e66fd5a12ebf0e2", 0x29}, {&(0x7f00000004c0)="8deb08b7aadc15954ff3bded0f8336752f62a4b9d16b3e8b24862f96faf59662401c13db7c21b2306af6e7939848a4a8f3062554b8cb75f2a6c869bd0820", 0x3e}, {&(0x7f0000000500)="a49602f4b7e2067b2d78656cd3cabd5ec38010fb6a518260dd1b232aca48939c7e7599f794593de9a3b63b24d6668ee7e1fa266f296b1c8b10597699759ce355f272c7c4d158bfa1620ce3881e5981919a7686a228d4675368e84d9b7907adf3320035a27de48d68f7f8ee05", 0x6c}, {&(0x7f0000000580)="19a00e3ad4174a2ce257873c41d0e1ad915989ec0e5c4530d67edbe6ee61bdc06baa3e24df9343ccf5a1ecfac1eb3df33aa7f057613ea1a587d0eb53b63fc220498a31f9d70136", 0x47}], 0x5}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000680)="b7329c26cb82f24e5e2a1570aeadfe53f1a37c89d1f8b0b682a67a12c7f2b5d0bb5c3f0a2407fcbe4863271005340f08e35c4170c6234be86922690289bdfe84f35ecbd4bcc7c189b49fea5ddf327dae5a46a0f763dca79084a2f6bb5ee251ab9caff42db39b3229e96871219cec6fb94ea25c6d63d3b11dc9a468f890417c69a2a80c231987ed780da93f363eefe7b5172855e9e7393540b31b359e84537bbfb2856f0a9421a4db1fcf", 0xaa}], 0x1, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0xa8}}, {{&(0x7f0000000840)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @local}, 0x2, 0xffff, 0x3}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000008c0)="c1d8bc4e2e0981612bd39ca86175b21112c11e16aa6d78906f5ec7924f57f9e6513d3601bf864f6c09e83300edc8bd5ebd71fbb8d12c6b1a11de0dba5d7a1049b847df6688a2b8ebdf977a194528860fb1d64dc175deede731a9af0eb8bd26d395b4a96d668821cb1199e6840771b40eefa1b897e2061c8fbf7048e0f5644d339a508c298a211195ae3278d153626bb372a8f447105f6283cdececdbf018472f49ad03f026457d1148ef1b908b", 0xad}, {&(0x7f0000000980)="acbf33f5bea8eaa54a2798c82fef0f86a9ee421d32456f169bae41b970307b913ff8b8161a5d6407dbf505a6e71981e84c6ce2b3d898c9c54617058e362e9a787bb26e8e12868199407cfc523fd9c9f54aa2143ab5d6879a270306976fb34e4d054914fd1e0fb713bbb5c0ab05a6a5888feda70c78682de43bad83a7259324ee", 0x80}, {&(0x7f0000000a00)="f8ecfd798913f93f953e8f6d452fa9c4b2f8934cb5a442d8e4bc9443f7c7904971113fd55412ab196c68a4529c7f5f844c1466816a7103a1", 0x38}, {&(0x7f0000000a40)="63a0e55ca75e3e21e461d636a0e2434fd4dc1ff4d6c89fc5625d00859394c85f87b636240e8aad7d7fdc696af9395b0801551151db71f66ba5037a", 0x3b}, {&(0x7f0000000a80)="6c74ba3deba790559cc2f4713efc8b4db9755fd0a149aca2af0d4b4612aefb4ae5f994787f3a2fbf86d4ed7b3ab4362e327ddabac87ee89fcc3185baf0c22e3be79b34b686d1bf5d738a1e38cfda39aa6a56fe3e8846a6cfe51b52339911179224dcdf00fc43fdf31be48f3cb47149cbf676e2ee8f82eed57fd0f93a519dcc816e4d910586baa7e654ac14cf6326bbddda4aa6", 0x93}, {&(0x7f0000000b40)="d6b7cd930bf550c3bb34d1cce2166a633000f2791a4180689b4106274205cf84de777b92a10028af537be21ab5655d9d752eb98df7f1c93995f1b7bd22b4de1c5e67e48d8eee490a378dab00ae924d1aada7f40be0733c0d3ff10fd9a93ffe168b972d66695f73e4843f61e217b32c5f135050e353d7ac293e8150", 0x7b}], 0x6, &(0x7f0000000c40)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}}, {{&(0x7f0000000c80)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e21, 0x1a3d, @mcast2, 0xfffeffff}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d00)="9e304c63bdc5f8fe2eb552a6dd9e1f532eca7e648ac2e5a2f19c6627ea6ac5a1c8d6aafebb3b6577cfc09c5a32da4782336389ee3f6030388afb2aeaf52bbafb720722e747980933e3d7d5305643b49af036de72686e7f7e1d715be769b4f20c74c222a07e09e93d4e2d4c724d15fa0d9ac12db87e9de5d67a13424586ff0bf45574474ee482fd8732a55db6e85b592187", 0x91}, {&(0x7f0000000dc0)="05aaed97e771329e4ce0ba84dcacaaf316154b645e17a2e8889f761d1845dd3b12cda63b40c084b614f2fb8653d070cf47879cd702ba7c0a8d50ede3b47e9612b0ab28b7d24ec4da4e8a03bcb4332dac99f2", 0x52}], 0x2, &(0x7f0000000e80)=[@mark={{0x14, 0x1, 0x24, 0x80000000}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x30}}, {{&(0x7f0000000ec0)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x0, 0x6, "63a4312f836f700b930d6cb626f4e05fa89663da63b238243a009878f4aa5eea73c316d34a557cbf4016abe2c31efee604260635df21245d37d62cd0a0cfe6", 0x26}, 0x80, &(0x7f0000002440)=[{&(0x7f0000000f40)="af31c5e20a9c55403620141f490ab24a68464def048f81c65e8adf3ad7ed9bbe70b671b8ca66b6c7b38f52f681d74303c93cba01ce806cf6fa826ac9a7b28d2900faecfe9aacb6d4585a29ba052bcabc26cacde2de70536865a3bd7142ff2fb0406c12bf1f568141ec5156f822c858a0f5aebf022e7803e32b5e0832079919dc3388df65b5aec317fe6f3f41c1df69124a0b00d7e1a6b0696e7439b3c4902598bef1ee178b347e65abcf3dff30f974e779df6ec477a0bfe8b88be74d", 0xbc}, {&(0x7f0000001000)="20a1b18f7f9fb67bde59c2f0c19edb5d5e4a3bebbe1d369d6effe445f793bf4e09d3d43907b610cece2fd8472af16d4574ee27d8df7e6ec2b4e865acb6fc6822908d65c8e592", 0x46}, {&(0x7f0000001080)="a5367de5591a4d0b47711767d3a6037d2ba1e5b5e720b5b006a4acc5bec42cdcf838d1616d3a768afdd0e6aa43c590a1bddf494e6889f92a4a6145ede4a6559d4d3d3604", 0x44}, {&(0x7f0000001100)="00926e7a6a1c0b079d3d0d4d362fc74d6a3b2fb30b310cbcc6b57b9ecb0c042de82ede52e9393298c7c7ec5d4b4e9710a68577ab4635d4d6b9cc87b72abaaadf6be1de76764c26e06263df2ac41e6e895c285f566535f94998f20dea57cb0a6e60aa8b972a574bb9357a9dcbc352006a442e007b45c6321cc9760878cb01414059d04dd94651ee7b562ce3c6ad75d2090a", 0x91}, {&(0x7f00000011c0)="03803d9ada1a08a8278ade629251f6548d12dfad5e191e2f9760dad09a4b84380f3ff343c95cd3463f49f0aac0cebc212b8ac4208fb4164211f3c5d0730028d0c0fe3681662f63c520b68099a95b648f1f89d598763275f71278181d3aa9fcb7ebd049fa70c3e13d8024955999fa31c680a6826eedfbdf6886d4619a403257518407714c3ebd512c9641e112b6b1881fb79ab3d31b5095b576b8a7c29d9ea0961c50f0f94c561ae2de22919bdae33f787ac7a1cbd03c36515edd48d4df66cedc102202fb39bc8d9a30efe92aaf26f64235d58961ae3caf7f2d57fabaafcdbd4bb680d98da587d096ee8baba15ff2ee03aabeca1548277f3b80651a1e74e1afb38ff4140579c66b25878cdee45416f91471aa31a7084e54bb6db8b0762083400de0c19145592e561e6091d5c14a79ba48afb0ffdcfb5444210ae98f114c725d3bc1e205a27952a4d7e0ed51241bafebe7eef69ca4814b755a59df058a6c7e946c452f57a3c74f799fe980be8d0b6181dc355a93fee2d56f9739e94625e7ffc2175870b2c7142479c5c1a1226ce1b149bf242b0bee77dfa30714b6f792185b5d4ede7cc790cc5422f723b12f32c06e854adae1e191b72b9f684b681cbce63c292d5c201d3e180e733a0b3c6e48664de038f91c2aa039460ac4c9f73d5465dfd9017342924f172adb7a8b3184e3e98d1fa784e819a05592e41ce4859c5126d69e35387e9483e1d0dfa9f62b448600525826ffb6d4766958f13044f5163b0db36c5e496af3c9991639ab8777271021ac1a6a652c7ac6c0f6f9197061fc19f04af5000fe2cdc85204cc0f224c29e9e2994ca38caf5d5cce5d18524db2f75b1c583fef672c9076bf89f49ce5374297db62d3217e25ddb6bde67f1100c35158d99099911b299d5c5ab61caee12a9307f4a421eea11d90427c2b678bb88771966d0a8209be5bad721edaa5c4bd9450a1ed7dea7dd7b3143ec2414c356f3cce6adbbd25701b23dc51549968208ce1c1b6b61702a9d4df8f0b3af877fa0f6cd6ae7abe9e65406a68685d8b73a005ab0af405eeff909c2715ada0ace0513333f421818a243bf774e265f66f75c33e75207635664e18fcda4a65c017213e873eff23ecce2f694802b10d33f7f3211f2d20c66103f6a233d3cca206489566028132d6dedff7d0eb3eb9204e918ce7a51b025b0cde4e9fbed9f716f0d2404c743c6a9ecb914cdb98a1b5d7223a839fde2c974b72156cb09a98d398c51344615595ad621a1b70b3e3106b36e41304dfa2d5859bd193d949421a0698b19ed72697713be07952dfe3d0a7bf0a942003477809ab8d4558f171005a002ebd9335fea4c21fbc1f82e930ad2e57dc8d3ce135b52dc9d9cb5d995bcbaf21bf26c330a209d307a9b6782f5a1a87a7a430b4bd399b31d8b760c47ec3904b59df4701928757fd3d224f633cdd0c63b7e201c3a304026365b58f07d5fe1dd806999096d7c02b5b3206b25e94ab391a19627334522c7af5876671cc07288572a2eb543dbbbc195d8185a63a046ae4c523e3cde1c3219886641c64fd867cb904df0eb232ad706d416d2932aa13861e535dd8e6d07b3677b9c36af123b84c916d171f30136bc895f567a4ffde74b61b8d626cafffbecbd97ca6cf0f3586d5df5ed72b2dde2d75419eef76e6c693e82b0fe3589d7eaefa73c15a1d7ac5f66c922e038e68ac7350fa7065c8e58448599d90d1bfb8b1301a35e65afb1ff3a368568ae514c20d4de2f90785a26a65eeb584680c7c75427112cc9ddafc4dd766d077abc923cf973f75c00dc745c2e3ce3c1e3dbd78baedc6501ca79e2b9f3ae0139121a179234ef81340d1cd4072b577f022f9295a32f9b764a2ed11e81eb408698bc826535aeb2e619950a4012410324793eddb0076c7dec16823518774a5cba091fa73c390ae33f7548ca8e6a688397ef19b69d67d27f6ebe68eb8a39081c3106168b81ef0070f037577dcaf38208d004e437a4b1623348af6b5bcc9a8f581a78ae73068b54566c04d0c5384ae06057113987f25bcb9c6d39143fafc55346652c22325d42bddcb2336dd5f25afc6a18e0d480625c9ec4c527d91bbd7de5235e2f2702997d2fc1386afe34974178fa68778c1c1c928c7edefb87fa2573543af31cf8a01bd1b4d690983077d544e2dbb377737b65d44d2dfb87f6c9a0c9eb354ce971f6c7b0cefeb6a133b64bead886a8d42e9fd2fb60583ae4009ab999d0c1042a044b8501d639bc037a997c8614d0f23f1336c56081724c992710805c6a2d4c292edcd2202094e35bfa645a0eab083d80448dc758734b2355ab94238ed7b875656f735fa6c55e8224718956a01252dfd2b7acb2c5242348af8fcde4e7c40491273f12ecf88d2e04de8783b6204ac5f656dadcbfd497966fe47b228b7813582bf75f3a63258692a3314ff6d2ca669bb84a520fc0ca4a71443dcf9485049671332fb2567363934b4e147e436bab65209507054ddd89691c8ed0356b258a99d6585e650edeea7553c2e8ea7f5891ec92cda40b3e39f3bc947dccade24f81945994e657ac61f0ab722d928e4358091e70cf25e69de242d3c0a21516d3783b251f0c01827fdc03c03e77cb5c6ab15fe8cc195abacc02e938f75675e12a6e4a0c81e87cfba573cee478de5d75ab7cae894dff20050658710c85a6bdd5ed1e5dacbc314faa5c2ffc37f47f20628fab4ed656ca950805168f323b98a0f5901b41f0a8eb9c551ce261780a4cddb9dfe025eae87dd004ef1a4966693487139ffaf08cf4df15fe0715cac7d70bb8bf099cf40bbb3735bdfc924594f5510c2cda2fdae6a791ced5e3eec13b4aa8abab9a98171d668627676707e5a6ebfaa9703addeb037fa9337a0bd921dfd5116f956da605faf0f791e6576aaa86d28ce7288a34abe841beffe66870e7c07ed7eba2903d4bebbd3a7966ba08f0b560a9f6be4bc13d2c6cafe638800b02140c3b9049ae24e1358d96982d9f126872af39ffc581ee159adbd911fad6adb7cfc98f96fdc66f4125b0095be85189b0ecd000c517167567e3d6277116dcb7276fb326da7411d7f6d455906fdf8d57805462d88fcb2c197c1fea80ced08d06fcb8fe4f134a72162022e2d7fec32a7d63d3c4a373fe4a2c4a532711acbcd71f3aee59c52eeb6daea608ba8523a3c56f8905eb2cb75cd28874bc811096b90d9357942719d295737a422db67a497b88a902f483ea286980825c1bbe9db53a445f9503abca722d366b18a109d6741029e070b84fb99c9210e5c95e16e846cc497cf14d2a13dcddfb54ab47909c00ffa732cb6914aca78027a4d3bd2eecfcdfea2dac3c0385184a19e7366db163a5340609742ea2dc60fb6f38ceb79debfb970c8987cc4598247f1e13caa8688fe44034ca6a5c4d963d794d48039aca9661085a5225331a729f187f1f83d8a30c1e0f092f8ae811c84dbdec5cfd05e06712dfbb8127cecc3e34ea8c7c024839354b9ae3763ff41f74303da8bc12b20b6fd3a436f951ecb212191f7ae8b588525726a315481bb08507ab1c09bb4b623a0a2f8fd3b1978d851b9f36f8216ecb771618abdf8cd5933cd81f62a0c57afb1952df565dea211d315193f859b67d44898e92a4549dc60e4832de022826e81d801fd48b25e4a847c3f878963f04f174955ca6435e9f11e69e3630b70dd64b52d96f71e4de686e0601b04832184ec23a33464463e7dfc49826ad055327f4faa606f4edb10d37e949401261dea17523cfaf2fc25301a7006a492cb0bea3c9fc1c6758665cc12c8ad9242948ddb68933b0d5340d1b114b0795dd1120dae9bc4bf08899349e1a1b339713a211ebd2cd927a9c8884b1e21403c708bbf3b6c89206ee114b301238ab360983b661f6acf9d1d2bb5758353df7d631fd87393f84d2dc9bbfc37df36a3cb7dee76f8bbce3f09fa0f299d9acd764060a6604d6bb507431495c45f6a5b2dc45c3e240228178d0e86dc3181609d3b1cde5b0b55fee24a419a466363b69c38f8c2fd3772e4bb0de2fa292b3b399eabefa93747b454b2ea3c172953c15a3d6b62348f070dbb431400401dd22dafa9de16cf1f03a29d8c4745a70d7f88098c38cd37052a8da3bbe40a5f48c7b0507a17df02902dca482b46ad34ab7f5ec1bdff2e43a8e260abc135f019ca868481d8f8c85af75cbb970728a4652add213e748bd770b2af56b3ac2101a0d542dcd4a978e39e67384ad812491852056982f813b79d0595f2d2b11da934a6f7e059b64dc92f773afb12faf4eb094ac691c6fa287632af0a48cafa84f18bb8f97cdd27712f514c9a7251d6819d10680081579953dff22d2489aff533762bc6a8e97e0ea1be2c05538127dcb4d9b92e3cda6cc5cf335ae8ff7d9c4cad6da3c6bfb8ce940b1ef4001377e832806fc3069acc233875b723c7faf13b24d7c8d7f3898add7e530ac5960110fd37c89ac3b2d54bc8938e4befeae538432739f31c8e40f6aacd526898b2bb330bb0262a66e360450f63afc49b5b4117b72d397a5df68a75e394aaae1d97270cedd08825eb1eb0c2a5d2685fd92975fce0dd1bf44c489a8e235fbc71d45adb82048833fbcb620f241eeca7280d779f8d5534ef64851344028eb21384be429761fdbdeebc6afa1c7e4626c91677c2bace88ed638826169d0763770ed8ef90801c56789549b093418cc5bec92569c387bb910e035ac4b93189cc76bb931b62b8e4c51c7f54e40ddb5beba198551fc441baa192ac52f7e5e4b15dbfa44d9779c07310949ada365ec3f7980437d79ce3760b33b6718a6ad2303866f0aeb618ca28475df12b1bdd6cb8e8f438ab176703ba033915c5d620a0e356ab66cfab2a4bf53a3625727a8d62f2a3ad47054a2b96e92d17c6bd08248f0e9c7fae0e9f6dd3a3f66c6918759186494bcf21000de3ad9e34c831e5896508f1de724eb07e2ef82c17996d24619b59c82297af9789a9da846925c06d3d5a1429c0759804862a9da56ad6807b9c993093a3c34bb141c86625f80cbef3dfd63581a1ff1e1e92706e1e7565901607ed50f3bf46d803e649a13fd6d0039997e986d61d606f37acc3d0fbd293a4581badca23b382e02d5898b1558b95e2c5b4fbdbee3512386bc7cd59c053b5957db59cbd77abab8535d6fca1c28a6d9585259230dba11f0a3489243655c7e1b55381f26a5487d1b9cfa1e33c53d73d906757e2855636f696f7d71dbb84e2e0edef7e055c7a4f1b7b9a299329c89187e39315414d1bc038b965fa4b3e0ed25f9736800fbe5c31d5f465326668c4df1a4332ef691a1126c9232cc5a3e4bd9c6c90cba93b3b53b971009aa06814316f3fd36041f0db5072f0ea18303c640d8f194bead320bb5a3923245ca0e26cb45c9810fbd99323a676386efacfd9ef7213c995e4defd86f72773677ef7bbe56aff528084634f88df171e0249d8412524445f03ff65f9f9aaf40a08974424635e51078308de2ef2ccb1669564eb9b30125249849f30af175a345bdb4fe38987284941181da4cc3ac5da22b95e24667dbe180203de36b9d3bca060e82f9d4dacf2e7d6e40f183b23f320fe8c4deb049c2019f3bce44c65bde041d88fec179c5e7626748c3fe663e90dd70fc0c831a3549cd82621bec9740445b3c4709001ddc1494188d121a0533ff6c22184aa7efc8eaf21d1455f105b2103065f743b93c95ee8f6b13166eb4a1e92ff2040acc4eb5e4e6894b14deea4e27ffeb9f53444c725922556d6540f632f57d9e832c3ca73866221c6b0858d60dc6e7698387bdd7c78233a44ae1e4ae7ef646976", 0x1000}, {&(0x7f00000021c0)="efe7fd046c77e220bc17ab76c7b68bf3b2c58e4904cc41597923b91f8c0f8fc2e1c9cd34d28220a20fc29590fd17d62c52c1281f113d63756630b859527a6ec051a8fd8dd9581f0bf5c0f90bb326a0a7c6a6548f1c9c9ac8bc8ff11d109795f36e497e868b2f00bde35ed775002be5e59d5928b6fbb970e02853f2f37a4456b9705db22bbbf242dba4da94b95d4496c5d365df0a6dac4650f94fa664bdf9fab53833892bf6dc53140aa7c7c8", 0xac}, {&(0x7f0000002280)="8dba5065edb1389d4195b258fa9d564c594f4e40c8e4a0b06b48c56eae7bba6a3feeb3f0d5", 0x25}, {&(0x7f00000022c0)="8e3bbfa2b8b71ff07f82d5f7f2bd8c5763cdbf602ccd4d642a3237667c65f89fefa871033799c4fe1fc23a148fcb105859853ba9d56a10c44ec121573cd7cdb9d2fb0d899b60e0e7c858c055a795ef9f6215d35ddc44e9af712e96256544cd5cb3c5b538cefef8e7af1bc5d4f1b4f51b61fc5e582bc0d17129a5bca8500e5ebb6e94d4d7180dfdfee1ccebeab3931b0193c16784fb25a7dcb956cc9a8509940e2fafb0103d0a65178116b0ac713a9aea1ff782874ecec927e04098a6f343d9960e1569b5b773bb", 0xc7}, {&(0x7f00000023c0)="917ee10e4be20024b6f0064ded9747612b1a601006f58f38fec8c555cadd2a2adb6959a9968402fe76f33189896ee9b7c574b55523871455569d7e6e43eb0d948b8b16", 0x43}], 0x9, &(0x7f0000002500)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff8}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @txtime={{0x18}}, @mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0xf0}}, {{&(0x7f0000002600)=@vsock, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002680)="43919524aeedeae5ac7ee9", 0xb}], 0x1, &(0x7f0000002700)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x18}}], 0x7, 0x20000080) [ 226.725235][T13039] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 226.744089][T13039] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 226.755489][T13039] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:10:31 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 226.770835][T13039] EXT4-fs (loop1): mount failed [ 226.796703][T13042] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 226.813391][T13042] EXT4-fs (loop4): group descriptors corrupted! [ 226.840419][T13053] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 226.849918][T13053] EXT4-fs (loop0): group descriptors corrupted! 02:10:31 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:31 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 226.946440][T13052] EXT4-fs (loop5): Unrecognized mount option "@" or missing value [ 226.979787][T13054] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 227.056367][T13063] EXT4-fs (loop2): unsupported descriptor size 0 02:10:32 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xd7) [ 227.137173][T13068] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 227.145210][T13064] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 227.149076][T13068] EXT4-fs (loop0): group descriptors corrupted! [ 227.170061][T13064] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 02:10:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 227.176018][T13052] EXT4-fs (loop5): Unrecognized mount option "@" or missing value [ 227.184225][T13064] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 227.213497][T13074] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 227.228787][T13074] EXT4-fs (loop4): group descriptors corrupted! [ 227.229384][T13064] EXT4-fs (loop1): mount failed 02:10:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) 02:10:32 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 227.262916][T13082] EXT4-fs (loop2): unsupported descriptor size 0 02:10:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:32 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 227.540661][T13087] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 227.558125][T13092] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 227.571849][T13087] EXT4-fs (loop0): group descriptors corrupted! [ 227.582192][T13085] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:10:32 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xd8) 02:10:32 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 227.680179][T13103] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 227.709150][T13103] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 227.714655][T13102] EXT4-fs (loop2): unsupported descriptor size 0 02:10:32 executing program 5: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = open(&(0x7f0000000700)='./file0\x00', 0x20000, 0x30) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000740)={'virt_wifi0\x00', {0x2, 0x0, @initdev}}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'gre0\x00', {0x2, 0x0, @multicast1}}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r6 = getuid() r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) connect(r7, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) sendto(r7, &(0x7f0000000580)="a5ac6a910bc1e480d4ebf9afce81077c51af46cca9fb21e7396773405c0b68a013c374227a0b5c4c15f1515556a22a8254d9c4b14b6338b386bafd3d5e67bbddde64ffa3a10e829e4a6d0b70102663f856bd2ca1165adc6c59f0406f18bce88b06aef2aa62bcd5868a4338e476a5a79373931d18bc71a3a615a6c3ebe8ac74e4fb3c6921627c14def58e37a6c52df42eb4001790ff8ed501118dad8eec96e8eb3c91", 0xa2, 0x80, &(0x7f0000000640)=@generic={0x1a, "19a338b3516acb6402905cb589a923561a682145a4c3a0b4fc24706af1541ccd6a203b803e62f8e0cf1788559b690a95b725e7d16acf99dfb614ed1d04398f4d2a68b43cbdb34b699d609ebc0624b40cb4f541a7cf2deadf9a12a87a0a1175d21dc1a3f4e223345ecd7fbccf4ff52aac4a652f69cbfbbe4f49b568112044"}, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@private1}}, &(0x7f0000000440)=0xe8) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000540)) getgroups(0x4, &(0x7f0000000780)=[r4, r4, r4, r4]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2, r6}, {0x2, 0x4, r3}, {0x2, 0x2, r3}, {0x2, 0x7, r3}, {0x2, 0x5, r8}, {0x2, 0x4, r3}], {0x4, 0x7}, [{0x8, 0x4, r4}, {0x8, 0x0, r4}, {0x8, 0x5, r9}], {}, {0x20, 0x1}}, 0x6c, 0x2) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0, 0x69) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r5, r2, 0x0) [ 227.722200][T13103] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 227.740580][T13103] EXT4-fs (loop1): mount failed 02:10:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 227.776974][T13106] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 227.786834][T13106] EXT4-fs (loop4): group descriptors corrupted! [ 227.815642][T13114] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:10:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:32 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 227.841650][T13122] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:10:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4040, 0x101) dup3(r1, r0, 0x0) 02:10:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 227.921189][T13126] EXT4-fs (loop2): unsupported descriptor size 0 [ 227.931128][T13117] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 227.957773][T13117] EXT4-fs (loop0): group descriptors corrupted! [ 227.971270][T13114] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 227.977275][T13129] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 227.999281][T13129] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 02:10:33 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xd9) [ 228.010445][T13129] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 228.026566][T13129] EXT4-fs (loop1): mount failed [ 228.098966][T13135] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 228.111058][T13135] EXT4-fs (loop4): group descriptors corrupted! [ 228.131528][T13138] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:10:33 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 228.144554][T13142] EXT4-fs (loop2): unsupported descriptor size 0 02:10:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:33 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:33 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x1800080, &(0x7f0000000400)={[{@no_bf_readahead}, {@no_bf_cache={'no_bf_cache', 0x3d, 0x1}}], [{@euid_lt={'euid<', r1}}, {@subj_role}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) r3 = dup3(r2, r0, 0x0) recvmmsg(r3, &(0x7f0000001780)=[{{&(0x7f00000002c0)=@nl, 0x80, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/61, 0x3d}, {&(0x7f0000000500)=""/115, 0x73}, {&(0x7f0000000580)=""/64, 0x40}], 0x3, &(0x7f0000000600)=""/68, 0x44}, 0xffffffad}, {{&(0x7f0000000680)=@isdn, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000740)=""/72, 0x48}, {&(0x7f00000007c0)=""/163, 0xa3}, {&(0x7f0000000880)=""/111, 0x6f}, {&(0x7f0000000900)=""/140, 0x8c}, {&(0x7f00000009c0)=""/62, 0x3e}], 0x6, &(0x7f0000000a80)=""/160, 0xa0}, 0x4}, {{0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000b40)=""/106, 0x6a}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)=""/35, 0x23}, {&(0x7f0000000c40)=""/73, 0x49}, {&(0x7f0000000cc0)=""/5, 0x5}, {&(0x7f0000000d00)=""/253, 0xfd}, {&(0x7f0000000e00)=""/149, 0x95}, {&(0x7f0000000ec0)=""/244, 0xf4}], 0x8, &(0x7f0000001040)=""/210, 0xd2}, 0x6}, {{&(0x7f0000001140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000001600)=[{&(0x7f00000011c0)=""/64, 0x40}, {&(0x7f0000001200)=""/171, 0xab}, {&(0x7f00000012c0)=""/33, 0x21}, {&(0x7f0000001300)=""/171, 0xab}, {&(0x7f00000013c0)=""/246, 0xf6}, {&(0x7f00000014c0)=""/11, 0xb}, {&(0x7f0000001500)=""/209, 0xd1}], 0x7, &(0x7f0000001680)=""/208, 0xd0}, 0x3f}], 0x4, 0x40000000, 0x0) [ 228.263353][T13150] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 228.294015][T13155] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) 02:10:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xda) [ 228.320134][T13155] EXT4-fs (loop0): group descriptors corrupted! [ 228.320780][T13157] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 228.345213][T13157] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 228.356415][T13157] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 228.370908][T13157] EXT4-fs (loop1): mount failed [ 228.401079][T13167] EXT4-fs (loop2): unsupported descriptor size 0 [ 228.421425][T13180] incfs: Options parsing error. -22 02:10:33 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:33 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:33 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 228.445511][T13170] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 228.455564][T13170] EXT4-fs (loop4): group descriptors corrupted! [ 228.476011][T13172] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 228.504607][T13177] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 228.535289][T13184] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) 02:10:33 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 228.540608][T13180] EXT4-fs error (device loop5): __ext4_new_inode:930: comm syz-executor.5: reserved inode found cleared - inode=1 [ 228.544842][T13184] EXT4-fs (loop0): group descriptors corrupted! [ 228.561400][T13180] incfs: Can't find or create .index dir in ./file0 [ 228.592816][T13188] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 228.606005][T13191] EXT4-fs (loop2): unsupported descriptor size 0 [ 228.612289][T13188] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 228.628822][T13188] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 228.629692][T13172] BUG: Dentry ffff8881f11b1330{i=0,n=.index} still in use (1) [unmount of ext4 loop5] [ 228.643191][T13188] EXT4-fs (loop1): mount failed [ 228.652646][T13172] ------------[ cut here ]------------ [ 228.662894][T13172] WARNING: CPU: 0 PID: 13172 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 228.671379][T13172] Modules linked in: [ 228.675355][T13172] CPU: 0 PID: 13172 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 228.685573][T13172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.695971][T13172] RIP: 0010:umount_check+0x179/0x1c0 [ 228.701236][T13172] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 20 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 67 a6 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 228.720819][T13172] RSP: 0018:ffff8881e38f7918 EFLAGS: 00010286 [ 228.726866][T13172] RAX: 0000000000000054 RBX: ffffffff85fa9d60 RCX: 0aac5ff9fd189000 [ 228.734815][T13172] RDX: ffffc90001c91000 RSI: 000000000003ed45 RDI: 000000000003ed46 [ 228.742765][T13172] RBP: ffff8881dd1a6420 R08: ffffffff814e8437 R09: ffffed103edc5e08 [ 228.750716][T13172] R10: ffffed103edc5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 228.758665][T13172] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881f11b1330 [ 228.766632][T13172] FS: 00007ff1a1972700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 228.775539][T13172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 228.782100][T13172] CR2: 00007f7a3ca76020 CR3: 00000001e7380000 CR4: 00000000001406f0 [ 228.790067][T13172] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 228.798163][T13172] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 228.806127][T13172] Call Trace: [ 228.809433][T13172] d_walk+0x2d9/0x540 [ 228.813397][T13172] ? __d_free+0x20/0x20 [ 228.817535][T13172] shrink_dcache_for_umount+0x8a/0x1a0 [ 228.822993][T13172] generic_shutdown_super+0x63/0x2a0 [ 228.828254][T13172] kill_block_super+0x79/0xd0 [ 228.833088][T13172] deactivate_locked_super+0xaf/0x100 [ 228.838452][T13172] deactivate_super+0x1b3/0x270 [ 228.843372][T13172] ? deactivate_locked_super+0x100/0x100 [ 228.848991][T13172] ? dput+0x4de/0x5d0 [ 228.853128][T13172] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 228.858221][T13172] ? find_next_bit+0xc6/0x110 [ 228.862876][T13172] cleanup_mnt+0x432/0x4e0 [ 228.867285][T13172] task_work_run+0x186/0x1b0 [ 228.871878][T13172] get_signal+0x1f34/0x1fc0 [ 228.876360][T13172] ? kick_process+0xc8/0x120 [ 228.881032][T13172] ? task_work_add+0xeb/0x120 [ 228.885774][T13172] ? lockref_get_or_lock+0x330/0x330 [ 228.891038][T13172] ? ptrace_notify+0x340/0x340 [ 228.895780][T13172] ? dput+0x4de/0x5d0 [ 228.899739][T13172] do_signal+0x8d/0x610 [ 228.903874][T13172] ? signal_fault+0x1e0/0x1e0 [ 228.908534][T13172] prepare_exit_to_usermode+0x207/0x310 [ 228.914058][T13172] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 228.919927][T13172] RIP: 0033:0x4665d9 [ 228.923804][T13172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 228.943388][T13172] RSP: 002b:00007ff1a1972188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 228.951776][T13172] RAX: 0000000000000000 RBX: 000000000056bf80 RCX: 00000000004665d9 [ 228.959723][T13172] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000200001c0 [ 228.968202][T13172] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 228.976152][T13172] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 228.984102][T13172] R13: 00007ffe13a7c8df R14: 00007ff1a1972300 R15: 0000000000022000 [ 228.992171][T13172] ---[ end trace 03e4c46bb8b8f40f ]--- [ 229.007363][T13172] BUG: Dentry ffff8881f11b1330{i=0,n=.index} still in use (1) [unmount of ext4 loop5] [ 229.017215][T13172] ------------[ cut here ]------------ [ 229.022679][T13172] WARNING: CPU: 1 PID: 13172 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 229.031144][T13172] Modules linked in: [ 229.035017][T13172] CPU: 1 PID: 13172 Comm: syz-executor.5 Tainted: G W 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 229.046612][T13172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.056661][T13172] RIP: 0010:umount_check+0x179/0x1c0 [ 229.061925][T13172] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 20 02 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 67 a6 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 229.083447][T13172] RSP: 0018:ffff8881e38f7918 EFLAGS: 00010286 [ 229.089494][T13172] RAX: 0000000000000054 RBX: ffffffff85fa9d60 RCX: 0aac5ff9fd189000 [ 229.097551][T13172] RDX: ffffc90001c91000 RSI: 000000000003ffff RDI: 0000000000040000 [ 229.105513][T13172] RBP: ffff8881dd1a6420 R08: ffffffff814e8437 R09: ffffed103ede5e08 [ 229.113472][T13172] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 229.121565][T13172] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881f11b1330 [ 229.129526][T13172] FS: 00007ff1a1972700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 229.138523][T13172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 229.145113][T13172] CR2: 0000001b31721000 CR3: 00000001e7380000 CR4: 00000000001406e0 [ 229.153063][T13172] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 229.161012][T13172] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 229.168960][T13172] Call Trace: [ 229.172234][T13172] d_walk+0x2d9/0x540 [ 229.176194][T13172] ? __d_free+0x20/0x20 [ 229.180355][T13172] shrink_dcache_for_umount+0x8a/0x1a0 [ 229.186059][T13172] generic_shutdown_super+0x63/0x2a0 [ 229.191318][T13172] kill_block_super+0x79/0xd0 [ 229.195967][T13172] deactivate_locked_super+0xaf/0x100 [ 229.201312][T13172] deactivate_super+0x1b3/0x270 [ 229.206138][T13172] ? deactivate_locked_super+0x100/0x100 [ 229.211865][T13172] ? dput+0x4de/0x5d0 [ 229.215909][T13172] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 229.221011][T13172] ? find_next_bit+0xc6/0x110 [ 229.225682][T13172] cleanup_mnt+0x432/0x4e0 [ 229.230081][T13172] task_work_run+0x186/0x1b0 [ 229.234754][T13172] get_signal+0x1f34/0x1fc0 [ 229.239236][T13172] ? kick_process+0xc8/0x120 [ 229.243801][T13172] ? task_work_add+0xeb/0x120 [ 229.248475][T13172] ? lockref_get_or_lock+0x330/0x330 [ 229.253747][T13172] ? ptrace_notify+0x340/0x340 [ 229.258497][T13172] ? dput+0x4de/0x5d0 [ 229.262500][T13172] do_signal+0x8d/0x610 [ 229.266721][T13172] ? signal_fault+0x1e0/0x1e0 [ 229.271384][T13172] prepare_exit_to_usermode+0x207/0x310 [ 229.276922][T13172] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 229.282807][T13172] RIP: 0033:0x4665d9 [ 229.286695][T13172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 229.306373][T13172] RSP: 002b:00007ff1a1972188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 229.314768][T13172] RAX: 0000000000000000 RBX: 000000000056bf80 RCX: 00000000004665d9 [ 229.322912][T13172] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000200001c0 [ 229.330868][T13172] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 229.339193][T13172] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 229.347152][T13172] R13: 00007ffe13a7c8df R14: 00007ff1a1972300 R15: 0000000000022000 02:10:34 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 229.355117][T13172] ---[ end trace 03e4c46bb8b8f410 ]--- [ 229.366270][T13172] VFS: Busy inodes after unmount of loop5. Self-destruct in 5 seconds. Have a nice day... 02:10:34 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0xe0) [ 229.432877][T13197] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 02:10:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:34 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 229.511024][T13202] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 229.520451][T13202] EXT4-fs (loop0): group descriptors corrupted! 02:10:34 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r2, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)={0x18c, 0x18, 0x1, 0x0, 0x0, "", [@nested={0x10a, 0x0, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="f800055263bafcd380b69bc384f95d8d126c328bd06df3710943c071f91367ad876b3c41f5b381d855b007812874be9add047722998096a3932819689ddee40333344e5656b1b7c00d2b72d16a5e548e165c2041705c201e0068a9d68186161bf28f395a65d38a638d6daa798680f2269a10bf51827b970322d3706d3bc9f6f3fb04603ac47469377f97c25157c5242f80f719f58509c9ec2d069220c41e8f8d5a9020b1105253ee54105fbb47a47faff658381144b0ab0791844e17ff5e9ca0cf8e3dae4e8a2383bce59cb6b2872822739ab6c110fb5d8b9b2933fdadc28647a1c2b9221703c1618ccc88c8c3515622afb7", @typed={0x4}, @typed={0x8, 0x78, 0x0, 0x0, @fd=r3}]}, @nested={0x6d, 0x0, 0x0, 0x1, [@generic="5980cd5cb0673668ece4ccf011eb10bf7a2b02ddbcdae6f04f10b35eda5172ec14fcfdfef57f040edf0d3c8ae9a816a18b87477478ea8ee2876fdfd99dc0fb7b6efee8b92c0315ab3ada9b07b1434e634044c50629e4f1fe0d32e55d292bf683e0f56700642656479a"]}]}, 0x18c}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=r6, @ANYBLOB="821d4f101177021e8fd7558bb803050500000000c44a4998dbf4cecbc7bc45caeaa1942f11fec7f62f3b0886c18acb83ec06f5cd508695a7c91172c61eb875ff0d43bef9175bb0f70519e0bb034fdee523476a9275af8334a326b02c3f4dfe789d29f4b0ee03262f622b3658634f8883b5e65e20fe99"], 0x20}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=@gettfilter={0x4c, 0x2e, 0x2, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r6, {0x9, 0xf}, {0xfff1}, {0x6, 0x2}}, [{0x8, 0xb, 0x4}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0xfffffffa}]}, 0x4c}, 0x1, 0x0, 0x0, 0x50}, 0x20000000) 02:10:34 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 229.628709][T13217] EXT4-fs (loop2): unsupported descriptor size 0 [ 229.636643][T13212] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 229.656070][T13209] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 229.674677][T13209] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 229.687940][T13209] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 229.702282][T13209] EXT4-fs (loop1): mount failed 02:10:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:34 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 229.790375][T13225] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 229.790793][T13223] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 229.882408][T13222] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 229.902750][T13212] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 229.910456][T13222] EXT4-fs (loop0): group descriptors corrupted! 02:10:34 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x300) 02:10:34 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 229.934072][T13237] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 229.953182][T13237] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 229.964538][T13237] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:10:34 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=@bridge_newvlan={0x54, 0x70, 0x200, 0x70bd25, 0x25dfdbff, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x48, 0x1}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x4}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x4}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xd}}]}, 0x54}, 0x1, 0x0, 0x0, 0xc080}, 0x40000) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0010, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x0) 02:10:34 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 229.980148][T13237] EXT4-fs (loop1): mount failed [ 230.004288][T13251] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 230.019266][T13240] EXT4-fs (loop2): unsupported descriptor size 0 02:10:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:35 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 230.187319][T13257] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 230.197483][T13257] EXT4-fs (loop0): group descriptors corrupted! [ 230.200689][T13255] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 230.299565][T13265] EXT4-fs (loop2): unsupported descriptor size 0 [ 230.310588][T13266] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 230.329039][T13266] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 02:10:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 230.339930][T13266] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 230.354757][T13266] EXT4-fs (loop1): mount failed [ 230.388515][T13276] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:10:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 230.400617][T13277] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 230.418948][T13269] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 230.430647][T13277] EXT4-fs (loop0): group descriptors corrupted! [ 230.440545][T13276] EXT4-fs (loop4): group descriptors corrupted! [ 230.480369][T13289] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 230.498970][T13289] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 230.510171][T13289] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 230.525111][T13289] EXT4-fs (loop1): mount failed 02:10:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xfffffffffffffffe, 0x4) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xfb, 0x1, 0x3, 0x3, 0x0, 0x101, 0x10091, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x800, 0x7fff}, 0x14002, 0x6efe, 0x80000001, 0x9, 0x20, 0x5a, 0xe48, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x2) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r3, r2, 0x80000) [ 230.616859][T13287] EXT4-fs (loop2): unsupported descriptor size 0 02:10:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:35 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x500) 02:10:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:35 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 230.775324][T13300] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 230.805712][T13300] EXT4-fs (loop4): group descriptors corrupted! 02:10:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 230.833962][T13303] EXT4-fs (loop2): unsupported descriptor size 0 [ 230.899663][T13308] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 230.909447][T13318] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 230.910304][T13309] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 230.919817][T13318] EXT4-fs (loop4): group descriptors corrupted! [ 230.939988][T13310] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 230.956335][T13309] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 230.972696][T13308] EXT4-fs (loop0): group descriptors corrupted! 02:10:35 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x600) 02:10:36 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 231.005025][T13321] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 231.015088][T13309] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 231.033877][T13309] EXT4-fs (loop1): mount failed 02:10:36 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 231.096086][T13330] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 231.106236][T13330] EXT4-fs (loop4): group descriptors corrupted! [ 231.113319][T13326] EXT4-fs (loop2): unsupported descriptor size 0 02:10:36 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 231.229087][T13335] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:10:36 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:36 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYRES16=0x0, @ANYBLOB], 0x8c}}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x700) [ 231.275299][T13342] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 231.293879][T13342] EXT4-fs error (device loop1): ext4_quota_enable:6002: comm syz-executor.1: Bad quota inode # 3 [ 231.314592][T13344] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r1) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7715, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="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", 0x1000, 0x7}, {&(0x7f00000012c0)="166b2859590be2b9b03e97d1630c0290ac118d789708e042433856359435c73054b615815f0cf23fea7058fc761d0a87f48d56534358360b19c32397bdd7c910e1c564941398a82649a8f269ead38a46e4f2b8dd2eb18cae387e72", 0x5b, 0x1000}], 0x210002, &(0x7f0000001340)=ANY=[@ANYBLOB='uni_xlate=1,nnonumtail=1,utf8=0,uni_xlate=0,shortname=winnt,iocharset=macgreek,uni_xlate=1,uni_xlate=1,usefree,utf8=0,dont_appraise,uid<', @ANYRESDEC=r1, @ANYBLOB=',subj_user=eefcontext=root,\x00\x00\x00\x00\x00\x00\x00']) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r4, 0xee01, r6) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x0, 0xee01}, {}, {0x8, 0x4}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x3}], {0x10, 0x2}}, 0x7c, 0x0) r7 = socket(0x10, 0x80002, 0x0) fstat(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r8) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000001700)="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", 0x2000, &(0x7f0000003fc0)={&(0x7f0000003700)={0x50, 0x0, 0x100000000, {0x7, 0x21, 0x8, 0x1000808, 0xffff, 0x3, 0x10000}}, &(0x7f0000001540)={0x18, 0x0, 0x2}, &(0x7f0000003780)={0x18, 0x0, 0x4}, &(0x7f00000037c0)={0x18, 0x0, 0x6, {0x5}}, &(0x7f0000003800)={0x18, 0x0, 0x6, {0x5}}, &(0x7f0000003840)={0x28, 0x0, 0x1, {{0x6, 0x0, 0x2}}}, &(0x7f0000003880)={0x60, 0x0, 0x3, {{0x22ae, 0x1, 0x8, 0x3bbc, 0x7, 0xfffffffb, 0x1, 0x9}}}, &(0x7f0000003900)={0x18, 0xfffffffffffffff5, 0x4, {0xfff}}, &(0x7f0000003940)={0x12, 0x0, 0x8, {',\x00'}}, &(0x7f0000003980)={0x20, 0xffffffffffffffda, 0x93, {0x0, 0x10}}, &(0x7f0000003b00)={0x78, 0x0, 0xff, {0x2, 0x3, 0x0, {0x2, 0x18a, 0x2, 0x10001, 0x9b, 0x5b54, 0x5, 0x2, 0x1d, 0xc000, 0xe0, 0x0, 0x0, 0x8}}}, &(0x7f0000003c40)={0x90, 0x0, 0x4, {0x5, 0x2, 0xffffffffffffff14, 0x100000000, 0x6, 0x3, {0x1, 0x3, 0x80, 0xaa1, 0x20, 0x7f, 0x4, 0xfffffffe, 0x0, 0x1000, 0x5, r1, 0x0, 0x8, 0x9}}}, &(0x7f0000003d00)={0xe8, 0x0, 0x4, [{0x6, 0x7, 0x5, 0x200, 'ext4\x00'}, {0x5, 0x7, 0x1, 0x2, '-'}, {0x6, 0x8, 0x0, 0x401}, {0x1, 0x80, 0x2, 0x6, ':\xa1'}, {0x4, 0x9, 0x5, 0x80000001, 'ext4\x00'}, {0x5, 0x0, 0x4, 0x0, '(&#^'}, {0x6, 0x101, 0x1, 0x1ff, '}'}]}, &(0x7f0000003e00)={0xa8, 0x0, 0xe3, [{{0x4, 0x1, 0x5, 0x0, 0x8, 0x80, {0x2, 0x0, 0x5, 0x10001, 0x2, 0x0, 0x8000, 0x0, 0x2ac5de7f, 0x0, 0x3, r1, r6, 0x200, 0x2b0}}, {0x4, 0x76, 0x0, 0x8}}]}, &(0x7f0000003ec0)={0xa0, 0x0, 0x0, {{0x2, 0x3, 0x3, 0x9b, 0xffffffff, 0x8, {0x0, 0x0, 0x80000001, 0x4, 0x7, 0xfe00000000000000, 0x3800, 0x1, 0x3, 0xc000, 0x6, r8, r2, 0x4, 0xa68c}}, {0x0, 0x10}}}, &(0x7f0000003f80)={0x20, 0xffffffffffffffda, 0x3, {0xffffffde, 0x4, 0x5, 0xf9d}}}) connect(r3, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) sendmsg$sock(r3, &(0x7f00000016c0)={&(0x7f0000001400)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001480)="0f2991ec8c8c29798ddbba38d68a9d3871804c91f6df8ea22efddf630591f01733d241e639f7a0130ccbdf2ee9a7a446324acb310c42bebb", 0x38}, {&(0x7f00000014c0)="ff65cba45442d16ea7fa9cc7f854199c8da20a713df0527e25e13a2e824c9d4c375604778a225061dddc7b863f434e26ad46a0c7c37d16659df1ff3789f1bb67f442a0a47c8cdba5283581bba642c421907e714f1234f72c39124db2637da69b231cffa3fc5737e2be41b625369a8e7083d51fe86259fb14", 0x78}, {&(0x7f0000001540)}, {&(0x7f0000001580)="e43dcef8d88dc859751357ffd0877f457ab08046f60399d8b87fb795ac1b6033b58143cab25b8b3eff5ce3fc16ae68", 0x2f}, {&(0x7f00000015c0)="5b3b881a2bc725d49cf15c03c31591a8f5c21b3a5227af106ab4ac3b36c5103a2d48e4b2594bdccce28b6c6e476e756335020591eb205c867b25ca6bdefeced6575ad3b750038d15c336a3ab77086e85d768a09f805de9bcbac80094bd6077f0f6aba0aba9f7d833e7a7b22a8f32114ddd584f12a4bb60d0", 0x78}], 0x5}, 0x40208a0) [ 231.341903][T13344] EXT4-fs (loop0): group descriptors corrupted! [ 231.344414][T13342] EXT4-fs warning (device loop1): ext4_enable_quotas:6042: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 231.373880][T13342] EXT4-fs (loop1): mount failed 02:10:36 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) 02:10:36 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x0, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d4"}, 0x11a) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket$netlink(0x10, 0x3, 0x0) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 231.441828][T13355] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 231.454187][T13351] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 231.457812][T13352] EXT4-fs (loop2): unsupported descriptor size 0 [ 231.464793][T13351] EXT4-fs (loop4): group descriptors corrupted! 02:10:36 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x79, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x125, 0x40, 0x0, 0x0, 0x1, 0x38, 0x0, 0x0, 0xbdcd}, [{0x0, 0x9, 0x3, 0x0, 0x0, 0x2641}], "90e08ca32e0cd73988f7f33c4bef4d16ef21e5aa87c35c4517a34e7285c36537686b470e4c0696e4a0c244d8fe6c0f537447bcc43875c6c538efd82083bd1a13f29dc6c6d5cf8b52b6614143035f1725a8385ec59b4283e1add32a1839c8f9f8ee95a70ad0fbf2880a04112c091d15098833f47872b1cae85be76298b36d874d6b3e306fe24365eb49eed8fbd997db0dbe7d0581caeb62ffe9e716a72b99956ff8d46f1a"}, 0x11c) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8801) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x29}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20000811) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2517000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00ff07000006000100030000000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000100000006001600420000000500120001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x4004001) socket(0x8, 0x0, 0x2) dup3(r1, r0, 0x0) [ 231.527495][T13357] EXT4-fs: failed to create workqueue [ 231.533041][T13357] EXT4-fs (loop5): mount failed 02:10:36 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000180)={0x1, r0}) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) r3 = open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='%*\x00') dup3(r2, r1, 0x0) 02:10:36 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)=